Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe

Overview

General Information

Sample name:Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
renamed because original name is a hash value
Original sample name:Zamwienie 89118 _ Metal-Constructions.pdf.com.exe
Analysis ID:1557566
MD5:1834eaa9099724ef4fe227478fed783a
SHA1:61176db35c4cda5a118bd4f3505d5bda26ebced0
SHA256:fd12d28d6b8030ec8e3d28c13ce562dc0f42b085806401b02a1155a6f44eb19c
Tags:exeuser-adrian__luca
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Quasar RAT
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe (PID: 716 cmdline: "C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe" MD5: 1834EAA9099724EF4FE227478FED783A)
    • Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe (PID: 876 cmdline: "C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe" MD5: 1834EAA9099724EF4FE227478FED783A)
      • schtasks.exe (PID: 6008 cmdline: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 3064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • workbook.exe (PID: 4832 cmdline: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" MD5: 1834EAA9099724EF4FE227478FED783A)
        • workbook.exe (PID: 2760 cmdline: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" MD5: 1834EAA9099724EF4FE227478FED783A)
          • schtasks.exe (PID: 1096 cmdline: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f MD5: 48C2FE20575769DE916F48EF0676A965)
            • conhost.exe (PID: 1372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • workbook.exe (PID: 3476 cmdline: C:\Users\user\AppData\Roaming\SubDir\workbook.exe MD5: 1834EAA9099724EF4FE227478FED783A)
    • workbook.exe (PID: 1208 cmdline: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" MD5: 1834EAA9099724EF4FE227478FED783A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "twart.myfirewall.org:9792;rency.ydns.eu:5287;wqo9.firewall-gateway.de:8841;", "SubDirectory": "SubDir", "InstallName": "workbook.exe", "MutexName": "02351e291-5d041-4fa37-932c7-869aeiQec514992", "StartupKey": "workbook", "Tag": "CODE", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "MIIE9DCCAtygAwIBAgIQANqzkhOLx49IztAjuviKazANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MDgyMDEyNDQxNVoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgCzkFEuivKBaTsClmq/3wI2X1uYUZUxf0vEiobTv72lQBIu1jz/r6PADg+cpeGisY1MV3VsdWhecO8dT7LosHtl/FnpTjASkUp3LF0d6cPTgeLsKbK/xJ06uq5gaKvG8Q5zXq6Jbxv+STJdEgmxCf1SPAXViD1PIiGLt2B24qZyOtsSpTSnM5cQuLAvr/6xZG7GYkCU7PRADMGFUm3Xg6L3vRUU3h6vaddoMBAW9ENXVaym1eN5aax3x4tLNUp+kerM+kb/Ab/mi01+PfutPKTptP/dqEGZuKmVrGdX9A+s2Wo6sPtSl85NJT+HT+SSrROvGbx4GH3d6MSHx71JSzy+dph46LV3brBMzY/2xvLbIuPVHqniL/Y0bsUke6aD9cfXIa4UBi7TiKBuoKJYqoYa/VgdoqB4yDaczAnzzYXov7thvPL1Rwv5TueNsPSrQbXbvEJUDxRazlLIrGLuYzeGrnbFHOTM8KKpSVnE8uiXiSEW31DRNHXyLImklMHjwtGd4sjZD5EfkUcg1v9gVCu80ggT+/l7SflY07DOLFvS1ii2ZUPu3IjcbyPtlFj6pGUYjMbIZj8AdqIKyMh6IWtbsu6TMC2yEPSk5pwXrEf7M89nIfHtuhZio+mZ0MhGyHos3nv51/dDBKQnEtcJiODik24kI3JTMGnfQsp7IMjECAwEAAaMyMDAwHQYDVR0OBBYEFFUq5ihhM0we5AVYMhcmFpT6wUKMMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADggIBAFQvpu2xTTenJ6N6YiRWxJ1cwH673yEt60lfsF/xncTeD79qdjD371b1GzQtcYZtYuSdgajGG4YZ8gBrwthm2fOcfuWK2VRDOe7/++mJVEvvsUzzexNeB5nZCYuu1N4UA7z8RHJy6ycPTTcelqyMKUjAGTCZa2BQhkxoFq+wBrEZrY975RcEe7bNNWg0S8YpvdKXxwy/gDZUoWyWXvgmDFQ6VjzDk3jJb0fonxnP/9F7sjd1uU2t5d6aQdPXzbzgWC/IKRXpfdIIZe15uHs1o1O909ymViRRsyy36cjwZ1M2snHWsU7vO//CptldBoV6k6bKkvXA23Cg1vUT0mj0MW554Vb20afxPhyWqHQa4ffHspH2HxViicHx9YaD+WjNAER0Skdo7/sxVR9Ozms2kb8Tyd18mwtVvwmlBNdtwsw8MX9PeW0AXlJUXkHkj47TVP+yyv1dKdUaGZq+ErPjiGoQGBCeHrrtGh+WryK38T7huLnpt++Q4U+CJ6+u9Mvd+C7MCZmgsO9sn0fTL/z54j3zBaWZoRcUZg8IZ7U+C5eGCrg9VjubVdYSar5CrCQnw8x2Rl63qjLVOwpiRoNnEXxmE23yyx1hkP8r27EcTbH7PpJHI22khScfDhf0X/99HEaBqcs+GI+YnC5dpPHY9koTdT5JckCfPJ9sprOn9Ble"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.2347202427.0000000000720000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
    00000007.00000002.2495454840.0000000004DE9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
      00000008.00000002.4797687511.0000000003674000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        00000001.00000002.2324969442.0000000002B61000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
          00000006.00000002.2396024927.00000000030D8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            Click to see the 13 entries
            SourceRuleDescriptionAuthorStrings
            1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.2b8fd48.0.raw.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
              1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                • 0x28d0d8:$x1: Quasar.Common.Messages
                • 0x29d43c:$x1: Quasar.Common.Messages
                • 0x2a9a26:$x4: Uninstalling... good bye :-(
                • 0x2ab21b:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                • 0x2a8fd8:$f1: FileZilla\recentservers.xml
                • 0x2a9018:$f2: FileZilla\sitemanager.xml
                • 0x2a905a:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                • 0x2a92a6:$b1: Chrome\User Data\
                • 0x2a92fc:$b1: Chrome\User Data\
                • 0x2a95d4:$b2: Mozilla\Firefox\Profiles
                • 0x2a96d0:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                • 0x2fb6ac:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                • 0x2a9828:$b4: Opera Software\Opera Stable\Login Data
                • 0x2a98e2:$b5: YandexBrowser\User Data\
                • 0x2a9950:$b5: YandexBrowser\User Data\
                • 0x2a9624:$s4: logins.json
                • 0x2a935a:$a1: username_value
                • 0x2a9378:$a2: password_value
                • 0x2a9664:$a3: encryptedUsername
                • 0x2fb5f0:$a3: encryptedUsername
                • 0x2a9688:$a4: encryptedPassword
                • 0x2fb60e:$a4: encryptedPassword
                • 0x2fb58c:$a5: httpRealm
                1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                • 0x163116:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                • 0x2a9b10:$s3: Process already elevated.
                • 0x28cdd7:$s4: get_PotentiallyVulnerablePasswords
                • 0x276e93:$s5: GetKeyloggerLogsDirectory
                • 0x29cb9b:$s5: GetKeyloggerLogsDirectory
                • 0x28cdfa:$s6: set_PotentiallyVulnerablePasswords
                • 0x2fccda:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
                Click to see the 33 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe", ParentImage: C:\Users\user\AppData\Roaming\SubDir\workbook.exe, ParentProcessId: 2760, ParentProcessName: workbook.exe, ProcessCommandLine: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, ProcessId: 1096, ProcessName: schtasks.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe", ParentImage: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, ParentProcessId: 876, ParentProcessName: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, ProcessCommandLine: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, ProcessId: 6008, ProcessName: schtasks.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-18T13:05:40.827770+010020355951Domain Observed Used for C2 Detected93.123.85.2345287192.168.2.649727TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-18T13:05:40.827770+010020276191Domain Observed Used for C2 Detected93.123.85.2345287192.168.2.649727TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.raw.unpackMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "twart.myfirewall.org:9792;rency.ydns.eu:5287;wqo9.firewall-gateway.de:8841;", "SubDirectory": "SubDir", "InstallName": "workbook.exe", "MutexName": "02351e291-5d041-4fa37-932c7-869aeiQec514992", "StartupKey": "workbook", "Tag": "CODE", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeReversingLabs: Detection: 63%
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeReversingLabs: Detection: 63%
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.2b8fd48.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.workbook.exe.474c818.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.workbook.exe.474c818.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.workbook.exe.43eaff8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.2347202427.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2495454840.0000000004DE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.4797687511.0000000003674000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2324969442.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2396024927.00000000030D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2347202427.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2426262742.0000000008F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2426262742.0000000008401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2355090315.0000000008511000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2408455047.00000000043EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2327331646.0000000003B69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe PID: 716, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe PID: 876, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 4832, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 3476, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 2760, type: MEMORYSTR
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeJoe Sandbox ML: detected
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeJoe Sandbox ML: detected
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.6:49728 version: TLS 1.2
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: GqZq.pdbSHA256; source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, workbook.exe.3.dr
                Source: Binary string: GqZq.pdb source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, workbook.exe.3.dr

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2027619 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (Quasar CnC) : 93.123.85.234:5287 -> 192.168.2.6:49727
                Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 93.123.85.234:5287 -> 192.168.2.6:49727
                Source: Malware configuration extractorURLs: twart.myfirewall.org
                Source: Yara matchFile source: 6.2.workbook.exe.474c818.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.workbook.exe.43eaff8.2.raw.unpack, type: UNPACKEDPE
                Source: global trafficTCP traffic: 192.168.2.6:49725 -> 45.88.3.229:9792
                Source: global trafficTCP traffic: 192.168.2.6:49727 -> 93.123.85.234:5287
                Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
                Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
                Source: Joe Sandbox ViewASN Name: NET1-ASBG NET1-ASBG
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: ipwho.is
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: twart.myfirewall.org
                Source: global trafficDNS traffic detected: DNS query: rency.ydns.eu
                Source: global trafficDNS traffic detected: DNS query: ipwho.is
                Source: workbook.exe, 00000008.00000002.4795693498.000000000173F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                Source: workbook.exe, 00000008.00000002.4795693498.000000000173F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                Source: workbook.exe, 00000008.00000002.4797687511.0000000003628000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipwho.is
                Source: workbook.exe, 00000008.00000002.4797687511.0000000003628000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipwho.isd
                Source: workbook.exe, 00000008.00000002.4797687511.0000000003674000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                Source: workbook.exe, 00000008.00000002.4797687511.0000000003674000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/d
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000003.00000002.2373638493.00000000034F1000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000008.00000002.4797687511.00000000033FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2327331646.0000000003B69000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2355090315.0000000008511000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000003.00000002.2347202427.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008401000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008F62000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2408455047.00000000043EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                Source: workbook.exe, 00000008.00000002.4797687511.0000000003616000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipwho.is
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2327331646.0000000003B69000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2355090315.0000000008511000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000003.00000002.2347202427.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008401000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008F62000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2408455047.00000000043EA000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000008.00000002.4797687511.0000000003616000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipwho.is/
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2327331646.0000000003B69000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2355090315.0000000008511000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000003.00000002.2347202427.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008401000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008F62000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2408455047.00000000043EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2327331646.0000000003B69000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2355090315.0000000008511000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000003.00000002.2347202427.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008401000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008F62000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2408455047.00000000043EA000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000008.00000002.4797687511.0000000003402000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2327331646.0000000003B69000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2355090315.0000000008511000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000003.00000002.2347202427.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008401000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008F62000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2408455047.00000000043EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot
                Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.6:49728 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\SubDir\workbook.exeJump to behavior

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.2b8fd48.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.workbook.exe.474c818.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.workbook.exe.474c818.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.workbook.exe.43eaff8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.2347202427.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2495454840.0000000004DE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.4797687511.0000000003674000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2324969442.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2396024927.00000000030D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2347202427.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2426262742.0000000008F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2426262742.0000000008401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2355090315.0000000008511000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2408455047.00000000043EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2327331646.0000000003B69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe PID: 716, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe PID: 876, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 4832, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 3476, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 2760, type: MEMORYSTR

                System Summary

                barindex
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                Source: 6.2.workbook.exe.474c818.1.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                Source: 6.2.workbook.exe.474c818.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 6.2.workbook.exe.474c818.1.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                Source: 6.2.workbook.exe.474c818.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                Source: 6.2.workbook.exe.474c818.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 6.2.workbook.exe.474c818.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                Source: 3.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                Source: 3.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 3.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                Source: 6.2.workbook.exe.43eaff8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                Source: 6.2.workbook.exe.43eaff8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 6.2.workbook.exe.43eaff8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                Source: initial sampleStatic PE information: Filename: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeCode function: 1_2_010FD3841_2_010FD384
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeCode function: 1_2_05CEB1401_2_05CEB140
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeCode function: 1_2_05CE22881_2_05CE2288
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeCode function: 1_2_05CE22781_2_05CE2278
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeCode function: 1_2_05CEAD081_2_05CEAD08
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeCode function: 1_2_05CEACF81_2_05CEACF8
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeCode function: 1_2_05CECCB81_2_05CECCB8
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeCode function: 1_2_05CEA8D01_2_05CEA8D0
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeCode function: 1_2_05CEC8801_2_05CEC880
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeCode function: 1_2_096907781_2_09690778
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeCode function: 3_2_019FF03C3_2_019FF03C
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_0142D3846_2_0142D384
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_05506E686_2_05506E68
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_055000406_2_05500040
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_055000066_2_05500006
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_05ADB1406_2_05ADB140
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_05AD22886_2_05AD2288
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_05AD22786_2_05AD2278
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_05ADAD086_2_05ADAD08
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_05ADCCB86_2_05ADCCB8
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_05ADACF86_2_05ADACF8
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_05ADC8806_2_05ADC880
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_05ADA8D06_2_05ADA8D0
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_077707786_2_07770778
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_0337D3847_2_0337D384
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_077407787_2_07740778
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_0167F03C8_2_0167F03C
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_0825B6D08_2_0825B6D0
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_08257E488_2_08257E48
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 11_2_017BF03C11_2_017BF03C
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2327331646.0000000003B69000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2324150960.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000000.2302207971.000000000088C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameGqZq.exed" vs Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2346299270.00000000052C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2324969442.0000000002B61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2324969442.0000000002B61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2355090315.0000000008511000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000003.00000002.2347202427.0000000000720000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeBinary or memory string: OriginalFilenameGqZq.exed" vs Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                Source: 6.2.workbook.exe.474c818.1.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                Source: 6.2.workbook.exe.474c818.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 6.2.workbook.exe.474c818.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                Source: 6.2.workbook.exe.474c818.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                Source: 6.2.workbook.exe.474c818.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 6.2.workbook.exe.474c818.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                Source: 3.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                Source: 3.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 3.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                Source: 6.2.workbook.exe.43eaff8.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                Source: 6.2.workbook.exe.43eaff8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 6.2.workbook.exe.43eaff8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@16/3@3/3
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.logJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3064:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMutant created: NULL
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMutant created: \Sessions\1\BaseNamedObjects\Local\02351e291-5d041-4fa37-932c7-869aeiQec514992
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1372:120:WilError_03
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeReversingLabs: Detection: 63%
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeFile read: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe "C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe"
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess created: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe "C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe"
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess created: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe "C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /fJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /fJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeStatic file information: File size 3706368 > 1048576
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x388400
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: GqZq.pdbSHA256; source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, workbook.exe.3.dr
                Source: Binary string: GqZq.pdb source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, workbook.exe.3.dr

                Data Obfuscation

                barindex
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, FormTada.cs.Net Code: InitializeComponent
                Source: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeStatic PE information: 0xC433CD02 [Mon Apr 23 17:12:34 2074 UTC]
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeCode function: 1_2_010FF432 push esp; iretd 1_2_010FF439
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeCode function: 1_2_010F9C41 push 30050493h; iretd 1_2_010F9C4D
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 6_2_077723B4 push esp; iretd 6_2_077723B5
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_0337F432 push esp; iretd 7_2_0337F439
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 7_2_03379C41 push 30059193h; iretd 7_2_03379C4D
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 8_2_08251DEF push 0000005Eh; iretd 8_2_08251DEE
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeFile created: C:\Users\user\AppData\Roaming\SubDir\workbook.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeFile opened: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\workbook.exe:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\workbook.exe:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe PID: 716, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 4832, type: MEMORYSTR
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeMemory allocated: 10F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeMemory allocated: 2B60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeMemory allocated: 4B60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeMemory allocated: 8510000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeMemory allocated: 9510000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeMemory allocated: 97F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeMemory allocated: A7F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeMemory allocated: ABB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeMemory allocated: 18D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeMemory allocated: 34F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeMemory allocated: 31C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 1280000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 3070000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 2E60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 8400000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 9400000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 96D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: A6D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: AA60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 3330000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 33F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 53F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 8950000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 9950000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 9C20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: AC20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: AFC0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 1670000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 33D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 1920000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 17B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 3540000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 3440000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWindow / User API: threadDelayed 5503Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWindow / User API: threadDelayed 4309Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeAPI coverage: 5.5 %
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeAPI coverage: 5.4 %
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe TID: 4784Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe TID: 2052Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 7064Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 6808Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 7124Thread sleep time: -29514790517935264s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 6960Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: workbook.exe, 00000008.00000002.4816444297.0000000005B80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlll
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeMemory written: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory written: C:\Users\user\AppData\Roaming\SubDir\workbook.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess created: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe "C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /fJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /fJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeQueries volume information: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeQueries volume information: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\workbook.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\workbook.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\workbook.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\workbook.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.2b8fd48.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.workbook.exe.474c818.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.workbook.exe.474c818.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.workbook.exe.43eaff8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.2347202427.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2495454840.0000000004DE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.4797687511.0000000003674000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2324969442.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2396024927.00000000030D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2347202427.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2426262742.0000000008F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2426262742.0000000008401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2355090315.0000000008511000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2408455047.00000000043EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2327331646.0000000003B69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe PID: 716, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe PID: 876, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 4832, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 3476, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 2760, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.2b8fd48.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.workbook.exe.474c818.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.workbook.exe.474c818.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.41f8618.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe.3edaff8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.workbook.exe.43eaff8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.2347202427.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2495454840.0000000004DE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.4797687511.0000000003674000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2324969442.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2396024927.00000000030D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2347202427.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2426262742.0000000008F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2426262742.0000000008401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2355090315.0000000008511000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2408455047.00000000043EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2327331646.0000000003B69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe PID: 716, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe PID: 876, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 4832, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 3476, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 2760, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                Windows Management Instrumentation
                1
                Scheduled Task/Job
                111
                Process Injection
                1
                Masquerading
                11
                Input Capture
                111
                Security Software Discovery
                Remote Services11
                Input Capture
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Scheduled Task/Job
                1
                DLL Side-Loading
                1
                Scheduled Task/Job
                1
                Disable or Modify Tools
                LSASS Memory41
                Virtualization/Sandbox Evasion
                Remote Desktop Protocol1
                Archive Collected Data
                1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                41
                Virtualization/Sandbox Evasion
                Security Account Manager1
                Application Window Discovery
                SMB/Windows Admin SharesData from Network Shared Drive1
                Ingress Tool Transfer
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                Process Injection
                NTDS1
                System Network Configuration Discovery
                Distributed Component Object ModelInput Capture2
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Hidden Files and Directories
                LSA Secrets23
                System Information Discovery
                SSHKeylogging113
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Obfuscated Files or Information
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Software Packing
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Timestomp
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                DLL Side-Loading
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1557566 Sample: Zam#U00f3wienie 89118 _ Met... Startdate: 18/11/2024 Architecture: WINDOWS Score: 100 42 rency.ydns.eu 2->42 44 twart.myfirewall.org 2->44 46 ipwho.is 2->46 56 Suricata IDS alerts for network traffic 2->56 58 Found malware configuration 2->58 60 Malicious sample detected (through community Yara rule) 2->60 62 10 other signatures 2->62 11 Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe 3 2->11         started        15 workbook.exe 2 2->15         started        signatures3 process4 file5 40 Zam#U00f3wienie 89...ons.pdf.com.exe.log, ASCII 11->40 dropped 70 Injects a PE file into a foreign processes 11->70 17 Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe 4 11->17         started        21 workbook.exe 2 15->21         started        signatures6 process7 file8 38 C:\Users\user\AppData\...\workbook.exe, PE32 17->38 dropped 54 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->54 23 workbook.exe 3 17->23         started        26 schtasks.exe 1 17->26         started        signatures9 process10 signatures11 64 Multi AV Scanner detection for dropped file 23->64 66 Machine Learning detection for dropped file 23->66 68 Injects a PE file into a foreign processes 23->68 28 workbook.exe 15 2 23->28         started        32 conhost.exe 26->32         started        process12 dnsIp13 48 rency.ydns.eu 93.123.85.234, 49727, 5287 NET1-ASBG Bulgaria 28->48 50 twart.myfirewall.org 45.88.3.229, 49725, 9792 INTERNET-ITNL Netherlands 28->50 52 ipwho.is 195.201.57.90, 443, 49728 HETZNER-ASDE Germany 28->52 72 Hides that the sample has been downloaded from the Internet (zone.identifier) 28->72 74 Installs a global keyboard hook 28->74 34 schtasks.exe 1 28->34         started        signatures14 process15 process16 36 conhost.exe 34->36         started       

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe63%ReversingLabsWin32.Backdoor.Quasarrat
                Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\SubDir\workbook.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\SubDir\workbook.exe63%ReversingLabsWin32.Backdoor.Quasarrat
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                rency.ydns.eu
                93.123.85.234
                truetrue
                  unknown
                  ipwho.is
                  195.201.57.90
                  truefalse
                    high
                    twart.myfirewall.org
                    45.88.3.229
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      https://ipwho.is/false
                        high
                        twart.myfirewall.orgfalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://api.ipify.org/Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2327331646.0000000003B69000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2355090315.0000000008511000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000003.00000002.2347202427.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008401000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008F62000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2408455047.00000000043EA000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://schemas.datacontract.org/2004/07/dworkbook.exe, 00000008.00000002.4797687511.0000000003674000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://stackoverflow.com/q/14436606/23354Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2327331646.0000000003B69000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2355090315.0000000008511000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000003.00000002.2347202427.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008401000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008F62000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2408455047.00000000043EA000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000008.00000002.4797687511.0000000003402000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://stackoverflow.com/q/2152978/23354sCannotZam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2327331646.0000000003B69000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2355090315.0000000008511000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000003.00000002.2347202427.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008401000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008F62000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2408455047.00000000043EA000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.datacontract.org/2004/07/workbook.exe, 00000008.00000002.4797687511.0000000003674000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameZam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000003.00000002.2373638493.00000000034F1000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000008.00000002.4797687511.00000000033FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://ipwho.isworkbook.exe, 00000008.00000002.4797687511.0000000003628000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://stackoverflow.com/q/11564914/23354;Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2327331646.0000000003B69000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000001.00000002.2355090315.0000000008511000.00000004.00000800.00020000.00000000.sdmp, Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe, 00000003.00000002.2347202427.0000000000402000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008401000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2426262742.0000000008F62000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 00000006.00000002.2408455047.00000000043EA000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://ipwho.isdworkbook.exe, 00000008.00000002.4797687511.0000000003628000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://ipwho.isworkbook.exe, 00000008.00000002.4797687511.0000000003616000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              45.88.3.229
                                              twart.myfirewall.orgNetherlands
                                              200313INTERNET-ITNLfalse
                                              93.123.85.234
                                              rency.ydns.euBulgaria
                                              43561NET1-ASBGtrue
                                              195.201.57.90
                                              ipwho.isGermany
                                              24940HETZNER-ASDEfalse
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1557566
                                              Start date and time:2024-11-18 13:04:11 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 10m 35s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:24
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
                                              renamed because original name is a hash value
                                              Original Sample Name:Zamwienie 89118 _ Metal-Constructions.pdf.com.exe
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.evad.winEXE@16/3@3/3
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:
                                              • Successful, ratio: 98%
                                              • Number of executed functions: 168
                                              • Number of non-executed functions: 9
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                              • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                              • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, tse1.mm.bing.net, g.bing.com, arc.msn.com, fe3cr.delivery.mp.microsoft.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                              • VT rate limit hit for: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
                                              TimeTypeDescription
                                              07:05:21API Interceptor1x Sleep call for process: Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe modified
                                              07:05:25API Interceptor10581727x Sleep call for process: workbook.exe modified
                                              13:05:25Task SchedulerRun new task: workbook path: C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              195.201.57.90SPt4FUjZMt.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, PythonCryptoHijacker, RedLineBrowse
                                              • /?output=json
                                              765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                                              • /?output=json
                                              765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                                              • /?output=json
                                              WfKynArKjH.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, RedLineBrowse
                                              • /?output=json
                                              ubes6SC7Vd.exeGet hashmaliciousUnknownBrowse
                                              • ipwhois.app/xml/
                                              cOQD62FceM.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                                              • /?output=json
                                              Clipper.exeGet hashmaliciousUnknownBrowse
                                              • /?output=json
                                              cOQD62FceM.exeGet hashmaliciousLuca StealerBrowse
                                              • /?output=json
                                              Cryptor.exeGet hashmaliciousLuca StealerBrowse
                                              • /?output=json
                                              Cryptor.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                                              • /?output=json
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              ipwho.isOrder88983273293729387293828PDF.exeGet hashmaliciousQuasarBrowse
                                              • 195.201.57.90
                                              1Eo0gOdDsV.exeGet hashmaliciousQuasarBrowse
                                              • 195.201.57.90
                                              https://2storageaccounterm67.z13.web.core.windows.net/Win08Ay0Er08d8d77/index.html#Get hashmaliciousTechSupportScamBrowse
                                              • 195.201.57.90
                                              https://tronblkma8sus7.z13.web.core.windows.net/?click_id=2isqs9oomm3gdtdt2&tid=903&subid=googlesapis.com&ref=googlesapis.com&922%5DGet hashmaliciousTechSupportScamBrowse
                                              • 195.201.57.90
                                              Exploit Detector LIST (2).batGet hashmaliciousUnknownBrowse
                                              • 15.204.213.5
                                              1.cmdGet hashmaliciousUnknownBrowse
                                              • 195.201.57.90
                                              Exploit Detector.batGet hashmaliciousUnknownBrowse
                                              • 195.201.57.90
                                              Exploit Detector LIST (2).batGet hashmaliciousUnknownBrowse
                                              • 195.201.57.90
                                              fqr76a(1).batGet hashmaliciousUnknownBrowse
                                              • 108.181.98.179
                                              yde4cz.cmdGet hashmaliciousUnknownBrowse
                                              • 195.201.57.90
                                              twart.myfirewall.orgPedido09669281099195.com.exeGet hashmaliciousDarkTortilla, QuasarBrowse
                                              • 213.159.74.80
                                              doc_Pedido 02024091622008176.com.exeGet hashmaliciousQuasarBrowse
                                              • 213.159.74.80
                                              doc_Zapytanie - Oferta POLSKA 91044PL.com.exeGet hashmaliciousQuasarBrowse
                                              • 213.159.74.80
                                              doc_Zapytanie - Oferta KH 09281.com.exeGet hashmaliciousQuasarBrowse
                                              • 213.159.74.80
                                              doc_rfq Oferta KH 09281.pdf.com.exeGet hashmaliciousQuasarBrowse
                                              • 213.159.74.80
                                              Client.exeGet hashmaliciousQuasarBrowse
                                              • 213.159.74.80
                                              rNuevoPedidoPO-00843.pdf.com.exeGet hashmaliciousQuasarBrowse
                                              • 213.159.74.80
                                              rVAKIFBANK-#U00d6demeonaymakbuzu20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                              • 213.159.74.80
                                              ZKB - Zahlungsbest#U00e4tigung an 20240828.pdf.exeGet hashmaliciousQuasarBrowse
                                              • 213.159.74.80
                                              Vak#U0131fBank - #U00d6deme onay makbuzu 20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                              • 213.159.74.80
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              NET1-ASBG11_deb64ed.exeGet hashmaliciousLokibotBrowse
                                              • 94.156.177.95
                                              kissmegoodthingwhichgivemebestthignswithgirluaremy.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LokibotBrowse
                                              • 94.156.177.95
                                              bestgirlfriendwhowintheheartwithentirelifegivenubestthigns.htaGet hashmaliciousCobalt Strike, HTMLPhisher, Lokibot, Strela StealerBrowse
                                              • 94.156.177.95
                                              Purchase order (1).xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                              • 94.156.177.95
                                              Purchase order (2).xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                              • 94.156.177.95
                                              Scan docs.exeGet hashmaliciousLokibotBrowse
                                              • 94.156.177.95
                                              Po docs.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                              • 94.156.177.95
                                              FDA50N50 ONESMI _10000.exeGet hashmaliciousLokibotBrowse
                                              • 94.156.177.220
                                              sh.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              • 93.123.85.201
                                              ntpd.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              • 93.123.85.201
                                              INTERNET-ITNLSecuriteInfo.com.FileRepMalware.25505.20211.exeGet hashmaliciousUnknownBrowse
                                              • 45.83.122.186
                                              https://skitech.siteGet hashmaliciousUnknownBrowse
                                              • 45.88.3.52
                                              pCOxE5kfPH.exeGet hashmaliciousDCRatBrowse
                                              • 185.212.130.27
                                              6l1kqDkxR2.elfGet hashmaliciousMoobotBrowse
                                              • 45.143.177.103
                                              https://stroy-domov.ru/go.php?url=https://iscon.onelink.me/QwvM/cookiesGet hashmaliciousUnknownBrowse
                                              • 45.83.122.134
                                              SNKL_Order_PO-0092744.xlsGet hashmaliciousUnknownBrowse
                                              • 45.88.3.46
                                              SNKL_Order_PO-0092744.xlsGet hashmaliciousUnknownBrowse
                                              • 45.88.3.46
                                              SNKL_Order_PO-0092744.xlsGet hashmaliciousUnknownBrowse
                                              • 45.88.3.46
                                              oferta_para_Tcnica_Salgar_757889.xlsGet hashmaliciousUnknownBrowse
                                              • 45.88.3.46
                                              oferta_para_Tcnica_Salgar_757889.xlsGet hashmaliciousUnknownBrowse
                                              • 45.88.3.46
                                              HETZNER-ASDEUnlock_Tool_v2.6.5.exeGet hashmaliciousStealc, VidarBrowse
                                              • 116.203.0.159
                                              Order88983273293729387293828PDF.exeGet hashmaliciousQuasarBrowse
                                              • 195.201.57.90
                                              file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, Credential Flusher, LummaC Stealer, Panda Stealer, StealcBrowse
                                              • 176.9.162.205
                                              1Eo0gOdDsV.exeGet hashmaliciousQuasarBrowse
                                              • 195.201.57.90
                                              4c9ebxnhQk.exeGet hashmaliciousUnknownBrowse
                                              • 95.216.22.87
                                              .main.elfGet hashmaliciousXmrigBrowse
                                              • 116.203.43.182
                                              https://hacktools.sh/Get hashmaliciousUnknownBrowse
                                              • 167.233.14.205
                                              http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                              • 88.99.67.51
                                              https://www.youtubedownloaderhd.com/Get hashmaliciousUnknownBrowse
                                              • 138.201.226.176
                                              Unit 2_week 4 2024.pptxGet hashmaliciousHTMLPhisherBrowse
                                              • 116.202.167.133
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              3b5074b1b5d032e5620f69f9f700ff0eWire slip account payable.pif.exeGet hashmaliciousAgentTeslaBrowse
                                              • 195.201.57.90
                                              JOSHHHHHH.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 195.201.57.90
                                              file.exeGet hashmaliciousLummaCBrowse
                                              • 195.201.57.90
                                              QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 195.201.57.90
                                              Benefits_Update_2024.pdfGet hashmaliciousUnknownBrowse
                                              • 195.201.57.90
                                              Aral#U0131k PO# IRON-TE-18024 _323282-_563028621286 pdf .exeGet hashmaliciousVIP KeyloggerBrowse
                                              • 195.201.57.90
                                              Richiesta Proposta (MACHINES ITALIA) 18-11-2024#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                              • 195.201.57.90
                                              GD7656780000.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 195.201.57.90
                                              Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                              • 195.201.57.90
                                              file.exeGet hashmaliciousCryptbotBrowse
                                              • 195.201.57.90
                                              No context
                                              Process:C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1216
                                              Entropy (8bit):5.34331486778365
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                              Malicious:true
                                              Reputation:high, very likely benign file
                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                              Process:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1216
                                              Entropy (8bit):5.34331486778365
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                              Process:C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):3706368
                                              Entropy (8bit):7.995915674825233
                                              Encrypted:true
                                              SSDEEP:98304:DApiYNYRIkC6rLk+hXKUXPHCU+6VbgAs25XXQn5lE1kU7:DAtYPjxJHCogAs25XAn5lEt
                                              MD5:1834EAA9099724EF4FE227478FED783A
                                              SHA1:61176DB35C4CDA5A118BD4F3505D5BDA26EBCED0
                                              SHA-256:FD12D28D6B8030EC8E3D28C13CE562DC0F42B085806401B02A1155A6F44EB19C
                                              SHA-512:04191F86B0F2D9C1EECF71B4FF26AD20DACDA5E4840B073A4C2A40B0927E8D3EC58ED6C12B4934EEAAEF0E8311FE9877886AE1D4EC0970377AC6F9C00E2ECED1
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 63%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....3...............0...8.........*.8.. ....8...@.. ........................9...........@..................................8.O.....8.......................8.......8.p............................................ ............... ..H............text...0.8.. ....8................. ..`.rsrc.........8.......8.............@..@.reloc........8.......8.............@..B..................8.....H........Y...7......1.........7..........................................0...........r...p(.....+..*.0................o....o.........,.....+Q(.....o.........,.....+9.s......(.....o....o....o.......o..............o..............,.....+.....+...*......S..^.......0...........(...........9.....s.......o.......o......r...po .....o!...r3..p..=...o"...&.o!...rG..p.o"...&.o!...rU..p.o"...&.(#.....,...o!...rc..p~$...o"...&.+...o!...rc..p.o"...&..o!...rq..p.o"...&.o!...r}..p..(%....A..
                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):7.995915674825233
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Windows Screen Saver (13104/52) 0.07%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              File name:Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
                                              File size:3'706'368 bytes
                                              MD5:1834eaa9099724ef4fe227478fed783a
                                              SHA1:61176db35c4cda5a118bd4f3505d5bda26ebced0
                                              SHA256:fd12d28d6b8030ec8e3d28c13ce562dc0f42b085806401b02a1155a6f44eb19c
                                              SHA512:04191f86b0f2d9c1eecf71b4ff26ad20dacda5e4840b073a4c2a40b0927e8d3ec58ed6c12b4934eeaaef0e8311fe9877886ae1d4ec0970377ac6f9c00e2eced1
                                              SSDEEP:98304:DApiYNYRIkC6rLk+hXKUXPHCU+6VbgAs25XXQn5lE1kU7:DAtYPjxJHCogAs25XAn5lEt
                                              TLSH:F9063340A560DA28CAF9AB3C6B70DB48173E715DFA24F48C1DC1E2D470BEF4A4935AD6
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....3...............0...8.........*.8.. ....8...@.. ........................9...........@................................
                                              Icon Hash:00928e8e8686b000
                                              Entrypoint:0x78a22a
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0xC433CD02 [Mon Apr 23 17:12:34 2074 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x38a1d50x4f.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x38c0000x5fc.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x38e0000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x3887ac0x70.text
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000x3882300x388400c28585992c7fa401d73bf4d4af890a54unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rsrc0x38c0000x5fc0x600c8fd4cd6699b91b64de7d8875c99922bFalse0.4381510416666667data4.2505606994207525IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x38e0000xc0x200787cb304b4fa6462cee29b2536dbea01False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_VERSION0x38c0900x36cdata0.4223744292237443
                                              RT_MANIFEST0x38c40c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                              DLLImport
                                              mscoree.dll_CorExeMain
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2024-11-18T13:05:40.827770+01002027619ET MALWARE Observed Malicious SSL Cert (Quasar CnC)193.123.85.2345287192.168.2.649727TCP
                                              2024-11-18T13:05:40.827770+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert193.123.85.2345287192.168.2.649727TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Nov 18, 2024 13:05:31.318106890 CET497259792192.168.2.645.88.3.229
                                              Nov 18, 2024 13:05:31.322978973 CET97924972545.88.3.229192.168.2.6
                                              Nov 18, 2024 13:05:31.323051929 CET497259792192.168.2.645.88.3.229
                                              Nov 18, 2024 13:05:31.329576969 CET497259792192.168.2.645.88.3.229
                                              Nov 18, 2024 13:05:31.334487915 CET97924972545.88.3.229192.168.2.6
                                              Nov 18, 2024 13:05:39.807183027 CET97924972545.88.3.229192.168.2.6
                                              Nov 18, 2024 13:05:39.807262897 CET497259792192.168.2.645.88.3.229
                                              Nov 18, 2024 13:05:39.816498041 CET497259792192.168.2.645.88.3.229
                                              Nov 18, 2024 13:05:39.821727037 CET97924972545.88.3.229192.168.2.6
                                              Nov 18, 2024 13:05:39.977554083 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:05:39.982508898 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:05:39.982758999 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:05:40.002295971 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:05:40.007282019 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:05:40.819509983 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:05:40.819586039 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:05:40.819684982 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:05:40.822850943 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:05:40.827769995 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:05:41.061604023 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:05:41.120609999 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:05:41.199333906 CET49728443192.168.2.6195.201.57.90
                                              Nov 18, 2024 13:05:41.199362993 CET44349728195.201.57.90192.168.2.6
                                              Nov 18, 2024 13:05:41.199625015 CET49728443192.168.2.6195.201.57.90
                                              Nov 18, 2024 13:05:41.200691938 CET49728443192.168.2.6195.201.57.90
                                              Nov 18, 2024 13:05:41.200707912 CET44349728195.201.57.90192.168.2.6
                                              Nov 18, 2024 13:05:42.346340895 CET44349728195.201.57.90192.168.2.6
                                              Nov 18, 2024 13:05:42.346426010 CET49728443192.168.2.6195.201.57.90
                                              Nov 18, 2024 13:05:42.348893881 CET49728443192.168.2.6195.201.57.90
                                              Nov 18, 2024 13:05:42.348902941 CET44349728195.201.57.90192.168.2.6
                                              Nov 18, 2024 13:05:42.349143982 CET44349728195.201.57.90192.168.2.6
                                              Nov 18, 2024 13:05:42.355460882 CET49728443192.168.2.6195.201.57.90
                                              Nov 18, 2024 13:05:42.403337002 CET44349728195.201.57.90192.168.2.6
                                              Nov 18, 2024 13:05:42.616239071 CET44349728195.201.57.90192.168.2.6
                                              Nov 18, 2024 13:05:42.616314888 CET44349728195.201.57.90192.168.2.6
                                              Nov 18, 2024 13:05:42.616447926 CET49728443192.168.2.6195.201.57.90
                                              Nov 18, 2024 13:05:42.686323881 CET49728443192.168.2.6195.201.57.90
                                              Nov 18, 2024 13:05:42.827698946 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:05:42.832688093 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:05:42.832811117 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:05:42.837784052 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:05:43.069209099 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:05:43.120497942 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:05:43.202255964 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:05:43.245421886 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:06:08.214171886 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:06:08.219115973 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:06:33.229867935 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:06:33.234883070 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:06:58.308084011 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:06:58.312926054 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:07:23.326603889 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:07:23.331505060 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:07:48.339286089 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:07:48.344239950 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:08:13.355014086 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:08:13.359996080 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:08:38.370610952 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:08:38.375745058 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:09:03.465600967 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:09:03.470602989 CET52874972793.123.85.234192.168.2.6
                                              Nov 18, 2024 13:09:28.497838974 CET497275287192.168.2.693.123.85.234
                                              Nov 18, 2024 13:09:28.503201008 CET52874972793.123.85.234192.168.2.6
                                              TimestampSource PortDest PortSource IPDest IP
                                              Nov 18, 2024 13:05:31.254688025 CET6265853192.168.2.61.1.1.1
                                              Nov 18, 2024 13:05:31.266165972 CET53626581.1.1.1192.168.2.6
                                              Nov 18, 2024 13:05:39.937673092 CET4916053192.168.2.61.1.1.1
                                              Nov 18, 2024 13:05:39.952347994 CET53491601.1.1.1192.168.2.6
                                              Nov 18, 2024 13:05:41.188683987 CET5619153192.168.2.61.1.1.1
                                              Nov 18, 2024 13:05:41.195686102 CET53561911.1.1.1192.168.2.6
                                              Nov 18, 2024 13:05:42.705722094 CET53627671.1.1.1192.168.2.6
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Nov 18, 2024 13:05:31.254688025 CET192.168.2.61.1.1.10xf278Standard query (0)twart.myfirewall.orgA (IP address)IN (0x0001)false
                                              Nov 18, 2024 13:05:39.937673092 CET192.168.2.61.1.1.10x854dStandard query (0)rency.ydns.euA (IP address)IN (0x0001)false
                                              Nov 18, 2024 13:05:41.188683987 CET192.168.2.61.1.1.10xb5c9Standard query (0)ipwho.isA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Nov 18, 2024 13:05:31.266165972 CET1.1.1.1192.168.2.60xf278No error (0)twart.myfirewall.org45.88.3.229A (IP address)IN (0x0001)false
                                              Nov 18, 2024 13:05:39.952347994 CET1.1.1.1192.168.2.60x854dNo error (0)rency.ydns.eu93.123.85.234A (IP address)IN (0x0001)false
                                              Nov 18, 2024 13:05:41.195686102 CET1.1.1.1192.168.2.60xb5c9No error (0)ipwho.is195.201.57.90A (IP address)IN (0x0001)false
                                              • ipwho.is
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.649728195.201.57.904432760C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-18 12:05:42 UTC150OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0
                                              Host: ipwho.is
                                              Connection: Keep-Alive
                                              2024-11-18 12:05:42 UTC223INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 12:05:42 GMT
                                              Content-Type: application/json; charset=utf-8
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              Server: ipwhois
                                              Access-Control-Allow-Headers: *
                                              X-Robots-Tag: noindex
                                              2024-11-18 12:05:42 UTC1033INData Raw: 33 66 64 0d 0a 7b 0a 20 20 20 20 22 41 62 6f 75 74 20 55 73 22 3a 20 22 68 74 74 70 73 3a 5c 2f 5c 2f 69 70 77 68 6f 69 73 2e 69 6f 22 2c 0a 20 20 20 20 22 69 70 22 3a 20 22 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 22 2c 0a 20 20 20 20 22 73 75 63 63 65 73 73 22 3a 20 74 72 75 65 2c 0a 20 20 20 20 22 74 79 70 65 22 3a 20 22 49 50 76 34 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 20 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 20 22 4e 41 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 54 65 78 61
                                              Data Ascii: 3fd{ "About Us": "https:\/\/ipwhois.io", "ip": "155.94.241.187", "success": true, "type": "IPv4", "continent": "North America", "continent_code": "NA", "country": "United States", "country_code": "US", "region": "Texa


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:1
                                              Start time:07:05:20
                                              Start date:18/11/2024
                                              Path:C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe"
                                              Imagebase:0x500000
                                              File size:3'706'368 bytes
                                              MD5 hash:1834EAA9099724EF4FE227478FED783A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000001.00000002.2324969442.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000001.00000002.2355090315.0000000008511000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000001.00000002.2327331646.0000000003B69000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:true

                                              Target ID:3
                                              Start time:07:05:22
                                              Start date:18/11/2024
                                              Path:C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exe"
                                              Imagebase:0xbf0000
                                              File size:3'706'368 bytes
                                              MD5 hash:1834EAA9099724EF4FE227478FED783A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000003.00000002.2347202427.0000000000720000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000003.00000002.2347202427.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:true

                                              Target ID:4
                                              Start time:07:05:24
                                              Start date:18/11/2024
                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                              Wow64 process (32bit):true
                                              Commandline:"schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f
                                              Imagebase:0x290000
                                              File size:187'904 bytes
                                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:5
                                              Start time:07:05:25
                                              Start date:18/11/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff66e660000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:6
                                              Start time:07:05:25
                                              Start date:18/11/2024
                                              Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                                              Imagebase:0x8e0000
                                              File size:3'706'368 bytes
                                              MD5 hash:1834EAA9099724EF4FE227478FED783A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000006.00000002.2396024927.00000000030D8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000006.00000002.2426262742.0000000008F62000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000006.00000002.2426262742.0000000008401000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000006.00000002.2408455047.00000000043EA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Antivirus matches:
                                              • Detection: 100%, Joe Sandbox ML
                                              • Detection: 63%, ReversingLabs
                                              Reputation:low
                                              Has exited:true

                                              Target ID:7
                                              Start time:07:05:25
                                              Start date:18/11/2024
                                              Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                              Imagebase:0xd90000
                                              File size:3'706'368 bytes
                                              MD5 hash:1834EAA9099724EF4FE227478FED783A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000007.00000002.2495454840.0000000004DE9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:true

                                              Target ID:8
                                              Start time:07:05:27
                                              Start date:18/11/2024
                                              Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                                              Imagebase:0xcd0000
                                              File size:3'706'368 bytes
                                              MD5 hash:1834EAA9099724EF4FE227478FED783A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000008.00000002.4797687511.0000000003674000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:false

                                              Target ID:9
                                              Start time:07:05:29
                                              Start date:18/11/2024
                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                              Wow64 process (32bit):true
                                              Commandline:"schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f
                                              Imagebase:0x290000
                                              File size:187'904 bytes
                                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:10
                                              Start time:07:05:29
                                              Start date:18/11/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff66e660000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:11
                                              Start time:07:05:34
                                              Start date:18/11/2024
                                              Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                                              Imagebase:0xdf0000
                                              File size:3'706'368 bytes
                                              MD5 hash:1834EAA9099724EF4FE227478FED783A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:9.3%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:215
                                                Total number of Limit Nodes:14
                                                execution_graph 28735 9691248 CloseHandle 28736 96912a2 28735->28736 28725 10fd458 28726 10fd49e GetCurrentProcess 28725->28726 28728 10fd4e9 28726->28728 28729 10fd4f0 GetCurrentThread 28726->28729 28728->28729 28730 10fd52d GetCurrentProcess 28729->28730 28731 10fd526 28729->28731 28732 10fd563 28730->28732 28731->28730 28733 10fd58b GetCurrentThreadId 28732->28733 28734 10fd5bc 28733->28734 28737 10f4668 28738 10f467a 28737->28738 28739 10f4686 28738->28739 28743 10f4778 28738->28743 28748 10f4218 28739->28748 28741 10f46a5 28744 10f479d 28743->28744 28752 10f4878 28744->28752 28756 10f4888 28744->28756 28749 10f4223 28748->28749 28764 10f5c6c 28749->28764 28751 10f706f 28751->28741 28753 10f4882 28752->28753 28755 10f498c 28753->28755 28760 10f44e0 28753->28760 28758 10f48af 28756->28758 28757 10f498c 28757->28757 28758->28757 28759 10f44e0 CreateActCtxA 28758->28759 28759->28757 28761 10f5918 CreateActCtxA 28760->28761 28763 10f59db 28761->28763 28765 10f5c77 28764->28765 28768 10f5c8c 28765->28768 28767 10f7115 28767->28751 28769 10f5c97 28768->28769 28772 10f5cbc 28769->28772 28771 10f71fa 28771->28767 28773 10f5cc7 28772->28773 28776 10f5cec 28773->28776 28775 10f72ed 28775->28771 28777 10f5cf7 28776->28777 28779 10f85eb 28777->28779 28782 10fac98 28777->28782 28778 10f8629 28778->28775 28779->28778 28786 10fcd80 28779->28786 28791 10facbf 28782->28791 28795 10facd0 28782->28795 28783 10facae 28783->28779 28787 10fcdb1 28786->28787 28788 10fcdd5 28787->28788 28803 10fcf31 28787->28803 28808 10fcf40 28787->28808 28788->28778 28792 10facd0 28791->28792 28798 10fadc8 28792->28798 28793 10facdf 28793->28783 28797 10fadc8 GetModuleHandleW 28795->28797 28796 10facdf 28796->28783 28797->28796 28799 10fadfc 28798->28799 28800 10fadd9 28798->28800 28799->28793 28800->28799 28801 10fb000 GetModuleHandleW 28800->28801 28802 10fb02d 28801->28802 28802->28793 28804 10fceeb 28803->28804 28805 10fcf3a 28803->28805 28804->28788 28807 10fcf87 28805->28807 28812 10fb7a0 28805->28812 28807->28788 28809 10fcf4d 28808->28809 28810 10fb7a0 GetModuleHandleW 28809->28810 28811 10fcf87 28809->28811 28810->28811 28811->28788 28813 10fb7ab 28812->28813 28815 10fdc98 28813->28815 28816 10fd0a4 28813->28816 28815->28815 28817 10fd0af 28816->28817 28818 10f5cec GetModuleHandleW 28817->28818 28819 10fdd07 28818->28819 28819->28815 28820 5cef5a0 28821 5cef72b 28820->28821 28822 5cef5c6 28820->28822 28822->28821 28824 5cea0a0 28822->28824 28825 5cef820 PostMessageW 28824->28825 28826 5cef88c 28825->28826 28826->28822 28552 5cedb81 28553 5cedb2d 28552->28553 28554 5cedb89 28552->28554 28555 5cedb42 28553->28555 28559 5cee3ce 28553->28559 28576 5cee368 28553->28576 28592 5cee358 28553->28592 28560 5cee35c 28559->28560 28562 5cee3d1 28559->28562 28561 5cee38a 28560->28561 28608 5cee7ab 28560->28608 28612 5cee871 28560->28612 28617 5ceed15 28560->28617 28622 5cee934 28560->28622 28627 5ceea37 28560->28627 28634 5cee8bb 28560->28634 28641 5ceeadd 28560->28641 28646 5ceee5d 28560->28646 28650 5ceea5c 28560->28650 28658 5cee8df 28560->28658 28664 5ceef1e 28560->28664 28668 5cee9c3 28560->28668 28673 5ceea87 28560->28673 28561->28555 28562->28555 28577 5cee382 28576->28577 28578 5cee7ab 2 API calls 28577->28578 28579 5ceea87 2 API calls 28577->28579 28580 5cee9c3 2 API calls 28577->28580 28581 5cee38a 28577->28581 28582 5ceef1e 2 API calls 28577->28582 28583 5cee8df 2 API calls 28577->28583 28584 5ceea5c 2 API calls 28577->28584 28585 5ceee5d 2 API calls 28577->28585 28586 5ceeadd 2 API calls 28577->28586 28587 5cee8bb 4 API calls 28577->28587 28588 5ceea37 4 API calls 28577->28588 28589 5cee934 2 API calls 28577->28589 28590 5ceed15 2 API calls 28577->28590 28591 5cee871 2 API calls 28577->28591 28578->28581 28579->28581 28580->28581 28581->28555 28582->28581 28583->28581 28584->28581 28585->28581 28586->28581 28587->28581 28588->28581 28589->28581 28590->28581 28591->28581 28593 5cee382 28592->28593 28594 5cee7ab 2 API calls 28593->28594 28595 5ceea87 2 API calls 28593->28595 28596 5cee9c3 2 API calls 28593->28596 28597 5cee38a 28593->28597 28598 5ceef1e 2 API calls 28593->28598 28599 5cee8df 2 API calls 28593->28599 28600 5ceea5c 2 API calls 28593->28600 28601 5ceee5d 2 API calls 28593->28601 28602 5ceeadd 2 API calls 28593->28602 28603 5cee8bb 4 API calls 28593->28603 28604 5ceea37 4 API calls 28593->28604 28605 5cee934 2 API calls 28593->28605 28606 5ceed15 2 API calls 28593->28606 28607 5cee871 2 API calls 28593->28607 28594->28597 28595->28597 28596->28597 28597->28555 28598->28597 28599->28597 28600->28597 28601->28597 28602->28597 28603->28597 28604->28597 28605->28597 28606->28597 28607->28597 28677 5ced506 28608->28677 28681 5ced510 28608->28681 28613 5cee882 28612->28613 28685 5ced378 28613->28685 28689 5ced372 28613->28689 28614 5ceeff3 28693 5ced288 28617->28693 28697 5ced280 28617->28697 28618 5ceec81 28618->28617 28619 5cee811 28618->28619 28623 5cee93a 28622->28623 28625 5ced288 WriteProcessMemory 28623->28625 28626 5ced280 WriteProcessMemory 28623->28626 28624 5cee973 28624->28561 28625->28624 28626->28624 28628 5ceea56 28627->28628 28629 5ceeb88 28627->28629 28701 5ced0e8 28628->28701 28705 5ced0f0 28628->28705 28709 5cec7c8 28629->28709 28713 5cec7d0 28629->28713 28635 5cee8c0 28634->28635 28636 5ceeb88 28635->28636 28639 5ced0e8 Wow64SetThreadContext 28635->28639 28640 5ced0f0 Wow64SetThreadContext 28635->28640 28637 5cec7c8 ResumeThread 28636->28637 28638 5cec7d0 ResumeThread 28636->28638 28637->28636 28638->28636 28639->28636 28640->28636 28642 5cee952 28641->28642 28643 5cee973 28641->28643 28644 5ced288 WriteProcessMemory 28642->28644 28645 5ced280 WriteProcessMemory 28642->28645 28643->28561 28644->28643 28645->28643 28717 5ced1c8 28646->28717 28721 5ced1c0 28646->28721 28647 5ceee7b 28647->28561 28651 5ceea65 28650->28651 28652 5ceec81 28651->28652 28654 5ced288 WriteProcessMemory 28651->28654 28655 5ced280 WriteProcessMemory 28651->28655 28653 5cee811 28652->28653 28656 5ced288 WriteProcessMemory 28652->28656 28657 5ced280 WriteProcessMemory 28652->28657 28654->28652 28655->28652 28656->28652 28657->28652 28659 5cee811 28658->28659 28660 5cee883 28658->28660 28662 5ced378 ReadProcessMemory 28660->28662 28663 5ced372 ReadProcessMemory 28660->28663 28661 5ceeff3 28662->28661 28663->28661 28665 5ceef24 28664->28665 28666 5cec7c8 ResumeThread 28665->28666 28667 5cec7d0 ResumeThread 28665->28667 28666->28665 28667->28665 28669 5cef012 28668->28669 28671 5ced0e8 Wow64SetThreadContext 28669->28671 28672 5ced0f0 Wow64SetThreadContext 28669->28672 28670 5cef02d 28671->28670 28672->28670 28675 5ced288 WriteProcessMemory 28673->28675 28676 5ced280 WriteProcessMemory 28673->28676 28674 5ceeab5 28674->28561 28675->28674 28676->28674 28678 5ced599 CreateProcessA 28677->28678 28680 5ced75b 28678->28680 28680->28680 28682 5ced599 CreateProcessA 28681->28682 28684 5ced75b 28682->28684 28684->28684 28686 5ced3c3 ReadProcessMemory 28685->28686 28688 5ced407 28686->28688 28688->28614 28690 5ced3c3 ReadProcessMemory 28689->28690 28692 5ced407 28690->28692 28692->28614 28694 5ced2d0 WriteProcessMemory 28693->28694 28696 5ced327 28694->28696 28696->28618 28698 5ced2d0 WriteProcessMemory 28697->28698 28700 5ced327 28698->28700 28700->28618 28702 5ced135 Wow64SetThreadContext 28701->28702 28704 5ced17d 28702->28704 28704->28629 28706 5ced135 Wow64SetThreadContext 28705->28706 28708 5ced17d 28706->28708 28708->28629 28710 5cec810 ResumeThread 28709->28710 28712 5cec841 28710->28712 28712->28629 28714 5cec810 ResumeThread 28713->28714 28716 5cec841 28714->28716 28716->28629 28718 5ced208 VirtualAllocEx 28717->28718 28720 5ced245 28718->28720 28720->28647 28722 5ced208 VirtualAllocEx 28721->28722 28724 5ced245 28722->28724 28724->28647 28827 10fd6a0 28828 10fd6e2 DuplicateHandle 28827->28828 28829 10fd736 28828->28829
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2371457643.0000000009690000.00000040.00000800.00020000.00000000.sdmp, Offset: 09690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_9690000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5693a9f445841614159fadfbd03d1d4e33ab12d0d4a00e08f2e7014420d56072
                                                • Instruction ID: 1f6fed0390480633726ecb633b975f966e8fc2325bc1eaf269fe3dbb18b869ec
                                                • Opcode Fuzzy Hash: 5693a9f445841614159fadfbd03d1d4e33ab12d0d4a00e08f2e7014420d56072
                                                • Instruction Fuzzy Hash: 7B328971B012049FEB19DF69D550BAEB7FAAF88704F24846DE14ADB7A1CB34E901CB50

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 010FD4D6
                                                • GetCurrentThread.KERNEL32 ref: 010FD513
                                                • GetCurrentProcess.KERNEL32 ref: 010FD550
                                                • GetCurrentThreadId.KERNEL32 ref: 010FD5A9
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2324734560.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10f0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: a2ba95ed8124683527c477617d52806a05726ecb11794406f7ca96687d9c350e
                                                • Instruction ID: 32afee8ae52552c173d3ed42f8418d4ecf9e37dac31a15d987b99f213e0c0801
                                                • Opcode Fuzzy Hash: a2ba95ed8124683527c477617d52806a05726ecb11794406f7ca96687d9c350e
                                                • Instruction Fuzzy Hash: FE5165B0900309CFEB44DFAAE549B9EBBF1EF88304F24805DE509A7290DB74A945CF65

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 010FD4D6
                                                • GetCurrentThread.KERNEL32 ref: 010FD513
                                                • GetCurrentProcess.KERNEL32 ref: 010FD550
                                                • GetCurrentThreadId.KERNEL32 ref: 010FD5A9
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2324734560.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10f0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: e0a38ed46b27b5c58510322be5d85b3f31157bbcc7d05d664e254b2b30add6b0
                                                • Instruction ID: 8001ce486839681ea63125980830f9d5844f2e09802e8253df0498175496ae63
                                                • Opcode Fuzzy Hash: e0a38ed46b27b5c58510322be5d85b3f31157bbcc7d05d664e254b2b30add6b0
                                                • Instruction Fuzzy Hash: 335175B0900309CFDB44DFAAE549B9EBBF1EF88304F24805DE509A7290DB34A945CF65

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 45 5ced506-5ced5a5 47 5ced5de-5ced5fe 45->47 48 5ced5a7-5ced5b1 45->48 53 5ced637-5ced666 47->53 54 5ced600-5ced60a 47->54 48->47 49 5ced5b3-5ced5b5 48->49 51 5ced5d8-5ced5db 49->51 52 5ced5b7-5ced5c1 49->52 51->47 55 5ced5c5-5ced5d4 52->55 56 5ced5c3 52->56 64 5ced69f-5ced759 CreateProcessA 53->64 65 5ced668-5ced672 53->65 54->53 57 5ced60c-5ced60e 54->57 55->55 58 5ced5d6 55->58 56->55 59 5ced610-5ced61a 57->59 60 5ced631-5ced634 57->60 58->51 62 5ced61e-5ced62d 59->62 63 5ced61c 59->63 60->53 62->62 66 5ced62f 62->66 63->62 76 5ced75b-5ced761 64->76 77 5ced762-5ced7e8 64->77 65->64 67 5ced674-5ced676 65->67 66->60 69 5ced678-5ced682 67->69 70 5ced699-5ced69c 67->70 71 5ced686-5ced695 69->71 72 5ced684 69->72 70->64 71->71 73 5ced697 71->73 72->71 73->70 76->77 87 5ced7ea-5ced7ee 77->87 88 5ced7f8-5ced7fc 77->88 87->88 91 5ced7f0 87->91 89 5ced7fe-5ced802 88->89 90 5ced80c-5ced810 88->90 89->90 92 5ced804 89->92 93 5ced812-5ced816 90->93 94 5ced820-5ced824 90->94 91->88 92->90 93->94 95 5ced818 93->95 96 5ced836-5ced83d 94->96 97 5ced826-5ced82c 94->97 95->94 98 5ced83f-5ced84e 96->98 99 5ced854 96->99 97->96 98->99 100 5ced855 99->100 100->100
                                                APIs
                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05CED746
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: 13fef2c6606b9dbfe3b0a2e73097f03b54b2811c4bf218777f8655835a138a7f
                                                • Instruction ID: ae7f95ded39037cc5236099c77b34cbc8a3fd2dc708a270b42d5d8fb0046f34c
                                                • Opcode Fuzzy Hash: 13fef2c6606b9dbfe3b0a2e73097f03b54b2811c4bf218777f8655835a138a7f
                                                • Instruction Fuzzy Hash: BB916E71D00219DFEB24CF68C8417EEBBB2FF49314F14896AD81AA7240DB759A85CF91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 102 5ced510-5ced5a5 104 5ced5de-5ced5fe 102->104 105 5ced5a7-5ced5b1 102->105 110 5ced637-5ced666 104->110 111 5ced600-5ced60a 104->111 105->104 106 5ced5b3-5ced5b5 105->106 108 5ced5d8-5ced5db 106->108 109 5ced5b7-5ced5c1 106->109 108->104 112 5ced5c5-5ced5d4 109->112 113 5ced5c3 109->113 121 5ced69f-5ced759 CreateProcessA 110->121 122 5ced668-5ced672 110->122 111->110 114 5ced60c-5ced60e 111->114 112->112 115 5ced5d6 112->115 113->112 116 5ced610-5ced61a 114->116 117 5ced631-5ced634 114->117 115->108 119 5ced61e-5ced62d 116->119 120 5ced61c 116->120 117->110 119->119 123 5ced62f 119->123 120->119 133 5ced75b-5ced761 121->133 134 5ced762-5ced7e8 121->134 122->121 124 5ced674-5ced676 122->124 123->117 126 5ced678-5ced682 124->126 127 5ced699-5ced69c 124->127 128 5ced686-5ced695 126->128 129 5ced684 126->129 127->121 128->128 130 5ced697 128->130 129->128 130->127 133->134 144 5ced7ea-5ced7ee 134->144 145 5ced7f8-5ced7fc 134->145 144->145 148 5ced7f0 144->148 146 5ced7fe-5ced802 145->146 147 5ced80c-5ced810 145->147 146->147 149 5ced804 146->149 150 5ced812-5ced816 147->150 151 5ced820-5ced824 147->151 148->145 149->147 150->151 152 5ced818 150->152 153 5ced836-5ced83d 151->153 154 5ced826-5ced82c 151->154 152->151 155 5ced83f-5ced84e 153->155 156 5ced854 153->156 154->153 155->156 157 5ced855 156->157 157->157
                                                APIs
                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05CED746
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: d62378db1a8629c432b9b3d19262a597cc24e5205dd4aea94ad4ccce581e7d55
                                                • Instruction ID: 045ac73471abd799d8f3cde29a4cb1f575d1923b1854df53aec6cfadd43d5647
                                                • Opcode Fuzzy Hash: d62378db1a8629c432b9b3d19262a597cc24e5205dd4aea94ad4ccce581e7d55
                                                • Instruction Fuzzy Hash: D4916F71D00219DFEB24CF68C8417EEBBB2FF49314F14896AD80AA7240DB759A85CF91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 159 10fadc8-10fadd7 160 10fadd9-10fade6 call 10fa120 159->160 161 10fae03-10fae07 159->161 167 10fadfc 160->167 168 10fade8 160->168 163 10fae1b-10fae5c 161->163 164 10fae09-10fae13 161->164 170 10fae5e-10fae66 163->170 171 10fae69-10fae77 163->171 164->163 167->161 214 10fadee call 10fb050 168->214 215 10fadee call 10fb060 168->215 170->171 172 10fae9b-10fae9d 171->172 173 10fae79-10fae7e 171->173 178 10faea0-10faea7 172->178 175 10fae89 173->175 176 10fae80-10fae87 call 10fa12c 173->176 174 10fadf4-10fadf6 174->167 177 10faf38-10faff8 174->177 180 10fae8b-10fae99 175->180 176->180 209 10faffa-10faffd 177->209 210 10fb000-10fb02b GetModuleHandleW 177->210 181 10faea9-10faeb1 178->181 182 10faeb4-10faebb 178->182 180->178 181->182 185 10faebd-10faec5 182->185 186 10faec8-10faed1 call 10fa13c 182->186 185->186 190 10faede-10faee3 186->190 191 10faed3-10faedb 186->191 192 10faee5-10faeec 190->192 193 10faf01-10faf0e 190->193 191->190 192->193 195 10faeee-10faefe call 10fa14c call 10fa15c 192->195 200 10faf31-10faf37 193->200 201 10faf10-10faf2e 193->201 195->193 201->200 209->210 211 10fb02d-10fb033 210->211 212 10fb034-10fb048 210->212 211->212 214->174 215->174
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 010FB01E
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2324734560.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10f0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: fb467d32097783b79fe34ad97599f58f9663e979b6c3234696096ef1f5fc411b
                                                • Instruction ID: 51664e4daa32b7690a4853480ddaa8ba3d08d6a9e0f94f88a3f8ab632d8492dd
                                                • Opcode Fuzzy Hash: fb467d32097783b79fe34ad97599f58f9663e979b6c3234696096ef1f5fc411b
                                                • Instruction Fuzzy Hash: B4712670A00B05CFE764DF69D45675ABBF1BF88304F10892DD68ADBA40DB35E909CB90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 216 10f590d-10f59d9 CreateActCtxA 218 10f59db-10f59e1 216->218 219 10f59e2-10f5a3c 216->219 218->219 226 10f5a3e-10f5a41 219->226 227 10f5a4b-10f5a4f 219->227 226->227 228 10f5a51-10f5a5d 227->228 229 10f5a60 227->229 228->229 230 10f5a61 229->230 230->230
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 010F59C9
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2324734560.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10f0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 30fff187f3faf4503876eb7b24f649264bbade5e9b9e32212f415f9d9fb7eb07
                                                • Instruction ID: df2fc236c53a564f587cfa03e7743dac663824d3acc37154e462d3639b8e7922
                                                • Opcode Fuzzy Hash: 30fff187f3faf4503876eb7b24f649264bbade5e9b9e32212f415f9d9fb7eb07
                                                • Instruction Fuzzy Hash: 2841D271C0071DCBDB24CFA9C88578EBBB1BF48704F20816AD548AB251DB75694ACF50

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 232 10f44e0-10f59d9 CreateActCtxA 235 10f59db-10f59e1 232->235 236 10f59e2-10f5a3c 232->236 235->236 243 10f5a3e-10f5a41 236->243 244 10f5a4b-10f5a4f 236->244 243->244 245 10f5a51-10f5a5d 244->245 246 10f5a60 244->246 245->246 247 10f5a61 246->247 247->247
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 010F59C9
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2324734560.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10f0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: edb1e4aab917104e955d58e1c4872307418b47c70d4f5f13d10c0bf61533b131
                                                • Instruction ID: 3327f11041d685fd7220f1281c97161558296fd48a1e4d39a13ea91b4e83eb14
                                                • Opcode Fuzzy Hash: edb1e4aab917104e955d58e1c4872307418b47c70d4f5f13d10c0bf61533b131
                                                • Instruction Fuzzy Hash: 234102B0C0071DCBDB24CFA9C885B9EBBF1BF48704F60816AD548AB251DB716946CF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 309 5ced280-5ced2d6 311 5ced2d8-5ced2e4 309->311 312 5ced2e6-5ced325 WriteProcessMemory 309->312 311->312 314 5ced32e-5ced35e 312->314 315 5ced327-5ced32d 312->315 315->314
                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05CED318
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: f97bef1e84b16f24df4e729fe29c71c331dabf092baca49af168d30c0225ace3
                                                • Instruction ID: 1566dd93d8a50f6e5c16ee38ee3d9fe777827f7bc7d8d3ec18f89963f7e0baf3
                                                • Opcode Fuzzy Hash: f97bef1e84b16f24df4e729fe29c71c331dabf092baca49af168d30c0225ace3
                                                • Instruction Fuzzy Hash: AD2133B1D003099FDB10CFAAC885BDEBBF1FF48310F10882AE919A7240D7789945CBA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 319 10fd698-10fd69c 320 10fd69e-10fd6df 319->320 321 10fd6e2-10fd734 DuplicateHandle 319->321 320->321 322 10fd73d-10fd75a 321->322 323 10fd736-10fd73c 321->323 323->322
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010FD727
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2324734560.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10f0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: ddacb066ba5d1ee58e96d92bea2904d8c2101866aa85acc89ef825c5a790728e
                                                • Instruction ID: 07422c9acaaeb527fe71412081b1848c9cde03857e10d4e856fc04b9841a325a
                                                • Opcode Fuzzy Hash: ddacb066ba5d1ee58e96d92bea2904d8c2101866aa85acc89ef825c5a790728e
                                                • Instruction Fuzzy Hash: 352137B59003499FDB10CFA9D884ADEFFF4EB49320F14415AE954A7250D374A941CFA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 327 5ced288-5ced2d6 329 5ced2d8-5ced2e4 327->329 330 5ced2e6-5ced325 WriteProcessMemory 327->330 329->330 332 5ced32e-5ced35e 330->332 333 5ced327-5ced32d 330->333 333->332
                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05CED318
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: f2cd380c3d5ca6efe29089e85d9bdc53e1b04250f1047c2c3093d4e7634b99b6
                                                • Instruction ID: e9aac2de99006ac56b0c34eadc01e34adaf3db8891f12cb583d6de9ea6d2509c
                                                • Opcode Fuzzy Hash: f2cd380c3d5ca6efe29089e85d9bdc53e1b04250f1047c2c3093d4e7634b99b6
                                                • Instruction Fuzzy Hash: 3A2125B1D003099FDB10DFAAC885BDEBBF5FF48310F50882AE919A7240D7789944CBA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 343 5ced0e8-5ced13b 345 5ced13d-5ced149 343->345 346 5ced14b-5ced17b Wow64SetThreadContext 343->346 345->346 348 5ced17d-5ced183 346->348 349 5ced184-5ced1b4 346->349 348->349
                                                APIs
                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 05CED16E
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: ContextThreadWow64
                                                • String ID:
                                                • API String ID: 983334009-0
                                                • Opcode ID: 63644ef6dd5a0b7fcf70c8c44e9ec0cbeb96eb1c200092ef057ebf741424bcf3
                                                • Instruction ID: 789089e200dce0820dbbbda70129cd3c8ec9fef01ac79394b4513362dc3806d3
                                                • Opcode Fuzzy Hash: 63644ef6dd5a0b7fcf70c8c44e9ec0cbeb96eb1c200092ef057ebf741424bcf3
                                                • Instruction Fuzzy Hash: 21212871D003099FDB10DFAAC8857EEBBF5EF88224F14842ED55AA7240D7789945CFA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 337 5cea06d-5cef88a PostMessageW 340 5cef88c-5cef892 337->340 341 5cef893-5cef8a7 337->341 340->341
                                                APIs
                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 05CEF87D
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: d9ebb6afc59119549c6da14c757316caad037f1e94bcadda2bd774f7441b62cf
                                                • Instruction ID: 9459d2339f049bb63de52138f723c8477e7d415bad44095e7e25ddc1b6b41036
                                                • Opcode Fuzzy Hash: d9ebb6afc59119549c6da14c757316caad037f1e94bcadda2bd774f7441b62cf
                                                • Instruction Fuzzy Hash: BA21A7B18043499FCB10CFAAC884BCFBBF8EB59320F15856AD658A7341D374A941CFA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 353 5ced372-5ced405 ReadProcessMemory 356 5ced40e-5ced43e 353->356 357 5ced407-5ced40d 353->357 357->356
                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05CED3F8
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: f17aeeaf5d31a6a0150e308d5946407bcdd68dc91ac5524d82299ded05bd83bd
                                                • Instruction ID: 4d27603f397b2f08461492af83dfdc7c6514dbc715743e27406dc5b1183e5e16
                                                • Opcode Fuzzy Hash: f17aeeaf5d31a6a0150e308d5946407bcdd68dc91ac5524d82299ded05bd83bd
                                                • Instruction Fuzzy Hash: 0D2123B1D003499FDB10DFAAD881AEEFBF1FF48310F10882AE519A7240D7789901CBA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 361 5ced0f0-5ced13b 363 5ced13d-5ced149 361->363 364 5ced14b-5ced17b Wow64SetThreadContext 361->364 363->364 366 5ced17d-5ced183 364->366 367 5ced184-5ced1b4 364->367 366->367
                                                APIs
                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 05CED16E
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: ContextThreadWow64
                                                • String ID:
                                                • API String ID: 983334009-0
                                                • Opcode ID: cea2d52418d9e0c4cd57dafbf0bbe2f1e8e113ed9b2e7e52514cc69bca3d021b
                                                • Instruction ID: 3fe5f92c601f70f3065ee42be4b82e28d73b243c2c74dac6f23dc80f22db6379
                                                • Opcode Fuzzy Hash: cea2d52418d9e0c4cd57dafbf0bbe2f1e8e113ed9b2e7e52514cc69bca3d021b
                                                • Instruction Fuzzy Hash: AF210971D003099FDB14DFAAC8857AEBBF4AF48224F54842ED55AA7240D7789945CBA0
                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05CED3F8
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: 255356583544c2be35cca7d769d1259b8509b7a3f1b54bde00bbc9a4e48d75fb
                                                • Instruction ID: d894e3c09b13823dff980b1f1b951f41158b141417ec325d888ec5926ea29cd8
                                                • Opcode Fuzzy Hash: 255356583544c2be35cca7d769d1259b8509b7a3f1b54bde00bbc9a4e48d75fb
                                                • Instruction Fuzzy Hash: 852125B1C003499FDB10DFAAD885BEEBBF5FF48310F54882AE519A7240D7799901CBA1
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010FD727
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2324734560.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10f0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: a21e76313f5a685881d59125914f352ddc0268c09e92a912f8edb7c0cc2b4e9a
                                                • Instruction ID: ab50b1eb86584783343eb9d9700895f989e109fd6ff6a3f026e8b12c631a08b3
                                                • Opcode Fuzzy Hash: a21e76313f5a685881d59125914f352ddc0268c09e92a912f8edb7c0cc2b4e9a
                                                • Instruction Fuzzy Hash: AF21B3B59002499FDB10CFAAD984ADEBBF4FB48310F14841AE954A7350D374A954CFA5
                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05CED236
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 99b324adfa84ee27137f897fefd6e318b5ae3c037adf71c884ff60d9e1b2e5a2
                                                • Instruction ID: 59438f136bf3c168e677f9337a10d255d8670668866f8ad895cc1fd453e86d3c
                                                • Opcode Fuzzy Hash: 99b324adfa84ee27137f897fefd6e318b5ae3c037adf71c884ff60d9e1b2e5a2
                                                • Instruction Fuzzy Hash: 11115971D002499FDB10DFAAD844BDFBBF5EF88310F14881AD519AB250C7759941CFA0
                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05CED236
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 626379c99a6dc9de4f386455debb5e4f3c67564384671c15586a37526a5d1d3d
                                                • Instruction ID: 5d016b8843a9636a6ae134a173414c3f00482ff01dc89310dfaf1440f2b248a3
                                                • Opcode Fuzzy Hash: 626379c99a6dc9de4f386455debb5e4f3c67564384671c15586a37526a5d1d3d
                                                • Instruction Fuzzy Hash: E91137719003499FDB14DFAAD844BDFBBF5EF88310F14881AE51AA7250C775A940CFA0
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: f71c9223be7282fa4301d73c6603445945abb9fbb3337eb3011b48f262052f8d
                                                • Instruction ID: c4fab3e1f0dbf27b16f174a3b4f044e80f1524d9e046a36e82c7c10554a0228e
                                                • Opcode Fuzzy Hash: f71c9223be7282fa4301d73c6603445945abb9fbb3337eb3011b48f262052f8d
                                                • Instruction Fuzzy Hash: 841158B1D003488FDB24DFAAD4857DEFBF4EB88310F24881AD519A7240D7799901CFA0
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: c993368ad8057b042b52ba339a880f39a9610fcc36d85b4c7c3c226ca097ebe2
                                                • Instruction ID: 14666575ea74a83bc764af268d487cae9bedfa5e79e4bdc3da44a8a0f15d6d6b
                                                • Opcode Fuzzy Hash: c993368ad8057b042b52ba339a880f39a9610fcc36d85b4c7c3c226ca097ebe2
                                                • Instruction Fuzzy Hash: E71128B1D003498FDB24DFAAD44579EFBF4EB88710F24881AD519A7240D779A944CBA0
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 010FB01E
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2324734560.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10f0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: e4821e312f5a2be11231a4a0ead228554370ddb797791cb8e773955806a9fffa
                                                • Instruction ID: 3742dfc998827f059da4370122785c26cded04b0cb3afd013f3cb1f81116e21a
                                                • Opcode Fuzzy Hash: e4821e312f5a2be11231a4a0ead228554370ddb797791cb8e773955806a9fffa
                                                • Instruction Fuzzy Hash: E01140B1C003098FDB20CF9AD448BDEFBF4EB88310F10802AD568A7600D379A505CFA0
                                                APIs
                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 05CEF87D
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: 6dc7179f94f6d0de84dc64d90e07c60b08c904bccce92384b3684de063cb7c93
                                                • Instruction ID: a2da91a703641fd203e7271c9205931c64b5ea9d83f11c5e44e232509d9ebae4
                                                • Opcode Fuzzy Hash: 6dc7179f94f6d0de84dc64d90e07c60b08c904bccce92384b3684de063cb7c93
                                                • Instruction Fuzzy Hash: 811122B58003089FDB20DF9AD488BDEBBF8EB48320F108419E919A7200C375A984CFA4
                                                APIs
                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 05CEF87D
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: d27b8751872b1f64291f6537f37cab1ec9b15aa22ccdb8670c23ef6561ae574c
                                                • Instruction ID: f7f73da1d9dcc55a20a6d3db537d03e983628e3a25021b6656325eca619a26ac
                                                • Opcode Fuzzy Hash: d27b8751872b1f64291f6537f37cab1ec9b15aa22ccdb8670c23ef6561ae574c
                                                • Instruction Fuzzy Hash: 6211F2B5900349DFDB20DF9AD588BDEBBF4EB48310F10845AE558A7250C374A944CFA0
                                                APIs
                                                • CloseHandle.KERNELBASE(?), ref: 096912A0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2371457643.0000000009690000.00000040.00000800.00020000.00000000.sdmp, Offset: 09690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_9690000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: CloseHandle
                                                • String ID:
                                                • API String ID: 2962429428-0
                                                • Opcode ID: 8fdecb11a34dc1adaf34be916712440287a1b9b42e256c0b3d3b36205ffc678d
                                                • Instruction ID: 95524213fc435acb88e59c5799ddffc58ad078149eb6d6348d0f155a489f1b4e
                                                • Opcode Fuzzy Hash: 8fdecb11a34dc1adaf34be916712440287a1b9b42e256c0b3d3b36205ffc678d
                                                • Instruction Fuzzy Hash: 1A1125B1C002498FCB10DF9AD584BDEBBF4EB48320F25842AD958A7340D378A545CFA1
                                                APIs
                                                • CloseHandle.KERNELBASE(?), ref: 096912A0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2371457643.0000000009690000.00000040.00000800.00020000.00000000.sdmp, Offset: 09690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_9690000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: CloseHandle
                                                • String ID:
                                                • API String ID: 2962429428-0
                                                • Opcode ID: 326adaa7a62bdcb3aec595a8bd445eeba0d0ba9d3cf55816b6c385deecc35411
                                                • Instruction ID: d886b26b77f10ae24f6d294150ae933fe1aecf5cf3ba30d127b0259540baf893
                                                • Opcode Fuzzy Hash: 326adaa7a62bdcb3aec595a8bd445eeba0d0ba9d3cf55816b6c385deecc35411
                                                • Instruction Fuzzy Hash: 1D1122B18002498FCB20DF9AC584BDEBBF4EB48320F21842AD958A7340D378A544CFA5
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2324460664.0000000000E6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E6D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_e6d000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a9277e86b8bc611896ed02d722f508462a4058504305a24ec945c20eb532b58f
                                                • Instruction ID: a74a3598f0b5e02b324d836606c678c849a551b6d1da8fa04bbfe1c320de19d0
                                                • Opcode Fuzzy Hash: a9277e86b8bc611896ed02d722f508462a4058504305a24ec945c20eb532b58f
                                                • Instruction Fuzzy Hash: B4214571A48240DFDB01DF14EDC0F26BF61FB88368F64C169E80A1B656C336D816CAA1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2324460664.0000000000E6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E6D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_e6d000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a79534b04530be4810469573d1417160677617cca50a5a33c19ce7d558ab31d7
                                                • Instruction ID: 341d7bbe36f2abc09621d6e900759f643cb1cf8362b2b4d845943cf73f02cd47
                                                • Opcode Fuzzy Hash: a79534b04530be4810469573d1417160677617cca50a5a33c19ce7d558ab31d7
                                                • Instruction Fuzzy Hash: 94213371A48244DFDB00DF04E9C0F16BF65FB98364F24C168E90A5B246C736EC56CAA2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2324536977.0000000000E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E8D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_e8d000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b50506581c9c230dc5f9cf1234db760f02481f88aaa3227fae2e9e9399a50a9f
                                                • Instruction ID: 440f21c3c140076397047496857094bf75832a54d869275f18b18a32b9f0657f
                                                • Opcode Fuzzy Hash: b50506581c9c230dc5f9cf1234db760f02481f88aaa3227fae2e9e9399a50a9f
                                                • Instruction Fuzzy Hash: 2B21D075608204EFDB14EF14D980B16BB66EB88318F24C5ADE90E5B296C37AD847CB61
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2324536977.0000000000E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E8D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_e8d000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d4cb446f88fc1cb763eb824a5be32967995d8261e6a5a8b852709bb4083dde20
                                                • Instruction ID: 798f725df6418caf175a6d33a4aeb520e38742c31aa807230fc3263ce4626192
                                                • Opcode Fuzzy Hash: d4cb446f88fc1cb763eb824a5be32967995d8261e6a5a8b852709bb4083dde20
                                                • Instruction Fuzzy Hash: D221807550D3848FCB02DF24D990715BF72EB46314F29C5EAD84D8B2A7C33A980ACB62
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2324460664.0000000000E6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E6D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_e6d000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a9b31bad3e5d6eb0f96c4d965fb2c37b7b820b0d943b1868179f970c6fb30aa6
                                                • Instruction ID: 0bbe0141af6334923f16d2f8ad49760b227d3d6b3baa4c42abef78a30082101b
                                                • Opcode Fuzzy Hash: a9b31bad3e5d6eb0f96c4d965fb2c37b7b820b0d943b1868179f970c6fb30aa6
                                                • Instruction Fuzzy Hash: 12112672904280CFCF11CF10E9C0B16BF71FB84328F24C6A9D80A0B656C33AD85ACBA1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2324460664.0000000000E6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E6D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_e6d000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a9b31bad3e5d6eb0f96c4d965fb2c37b7b820b0d943b1868179f970c6fb30aa6
                                                • Instruction ID: 6a6d6cf7df6b7fa2aaeb5381690736eae01462711bf6a6dc4bfae79e25a28672
                                                • Opcode Fuzzy Hash: a9b31bad3e5d6eb0f96c4d965fb2c37b7b820b0d943b1868179f970c6fb30aa6
                                                • Instruction Fuzzy Hash: 66110372904244CFCB11CF00D9C0B16BF71FB94324F24C2A9D8094B256C33AE85ACBA1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2324460664.0000000000E6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E6D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_e6d000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b42360eb930c2bda51a801b3550ad6025a7f965cbeb145a03af5bea323392a48
                                                • Instruction ID: d1142be27d2e6c12516b0318009a561bd5e840e1c2763c4457b6fe211dc23524
                                                • Opcode Fuzzy Hash: b42360eb930c2bda51a801b3550ad6025a7f965cbeb145a03af5bea323392a48
                                                • Instruction Fuzzy Hash: F801F771A483049AE7204B15EC80B66BF98EF513A4F58841BED096A282C339B840C672
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2324460664.0000000000E6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E6D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_e6d000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cf6e64c2fffd7d20eaf630d7f5501b0539f5137f0026a2b2e016ca5e1388f129
                                                • Instruction ID: ed56dd1247d561864d5a0e975d6272d3ca36ef6e65b959e6d17a5bd37c0c9e81
                                                • Opcode Fuzzy Hash: cf6e64c2fffd7d20eaf630d7f5501b0539f5137f0026a2b2e016ca5e1388f129
                                                • Instruction Fuzzy Hash: AFF0C271508344AEEB208E06DC84B62FBA8EF50768F18C45AED085A286C379A844CAB1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7916598dddf254696f1b3c26de5df843d5760dd75117ede12ac946d268c96f74
                                                • Instruction ID: 06d7997d567ad5d4794e462b115b977b3138d68ff03eed65bad9595068a573a4
                                                • Opcode Fuzzy Hash: 7916598dddf254696f1b3c26de5df843d5760dd75117ede12ac946d268c96f74
                                                • Instruction Fuzzy Hash: 95E12B74E002198FDB14DFA9C5809AEFBB2FF89309F248569D419A7356CB30AD42CF60
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 91fe359f16fa76f18bfb0cfef86c6824c6561e8d4a8d6654edba3b6ba636915a
                                                • Instruction ID: 06d348479c4bfb9eec72bed0f3eb7923c8932203d54acf614b42101ffe0fb065
                                                • Opcode Fuzzy Hash: 91fe359f16fa76f18bfb0cfef86c6824c6561e8d4a8d6654edba3b6ba636915a
                                                • Instruction Fuzzy Hash: 6DE11B74E002198FDB14DFA9C580AAEFBF2BF89309F248569D419A7356DB31AD41CF60
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b15ec054586a346207dba1ca7e2475fed137ca7067c48f7b853fae91ab302531
                                                • Instruction ID: 9e0b19bc318a9cb9a344e14035d282517711d98dda95fd500485f1f54555105d
                                                • Opcode Fuzzy Hash: b15ec054586a346207dba1ca7e2475fed137ca7067c48f7b853fae91ab302531
                                                • Instruction Fuzzy Hash: 8FE11B74E042198FDB14DFA9C580AAEFBB2FF88309F248559D419A7356DB31AD42CF60
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c78108fc534badd552c117a05dc36b81faaaf70d1aca532ef1dd6c4ea1329bc9
                                                • Instruction ID: 26be11f8ba939ed451de80a147f5e4a3115967e7e5b1b7ae1880b782bee11cf1
                                                • Opcode Fuzzy Hash: c78108fc534badd552c117a05dc36b81faaaf70d1aca532ef1dd6c4ea1329bc9
                                                • Instruction Fuzzy Hash: 6EE12C74E002198FDB14DFA9C984AAEFBF2FF89308F248559D419A7355DB31A941CF60
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: aa8f25248045b8487cc68d04dd036351c8f3b10e789ae375f2909190774f5f14
                                                • Instruction ID: 042a090cf3e88926086e2ffc79e9dfbac27d72c1e18199d6d1beca8f4342deb5
                                                • Opcode Fuzzy Hash: aa8f25248045b8487cc68d04dd036351c8f3b10e789ae375f2909190774f5f14
                                                • Instruction Fuzzy Hash: 6FE10C74E002198FDB14DFA9C580AAEFBB2FF88309F248569D519A7355DB30AD41CF60
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d3d8edcbaba24ed4e06fd759ae02f20b260b3628e2a1f61d86344a0d77dc5c64
                                                • Instruction ID: 01958f7a314ad869693021887eee4a6c6b6657b28f500c9501389c8033569b8a
                                                • Opcode Fuzzy Hash: d3d8edcbaba24ed4e06fd759ae02f20b260b3628e2a1f61d86344a0d77dc5c64
                                                • Instruction Fuzzy Hash: 9ED11531C2071ACACB01EFA4D9906ADB7B1FF95300F24D79AE04937661EB706AC4CB91
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2324734560.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_10f0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e2cc80dd977fc387e613f04d57230034ca3ae0a2eb8daf2d6674ca2afcab4de8
                                                • Instruction ID: c85bf72f001c9a0810257e2e36811e5da2cb8d5779f09680643af32cfc0172c7
                                                • Opcode Fuzzy Hash: e2cc80dd977fc387e613f04d57230034ca3ae0a2eb8daf2d6674ca2afcab4de8
                                                • Instruction Fuzzy Hash: E9A16D36E002068FCF05DFB4C4815DEBBB2FF85300B1585AEEA05AB265DB71E916CB40
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4ee7f5e40e5a530b4084b31ce49cdc65838c94aa6ac1691344c2286ef16b598e
                                                • Instruction ID: 0fee9acac330f751de9e7b053c4b48203ed56d631ea518daa202fc45da08afb1
                                                • Opcode Fuzzy Hash: 4ee7f5e40e5a530b4084b31ce49cdc65838c94aa6ac1691344c2286ef16b598e
                                                • Instruction Fuzzy Hash: 17D10531D2071ACACB01EFA4D9906ADB7B1FF95300F24D79AE14937661EB706AC4CB91
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2346706242.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5ce0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4862a7eef1a4311bfe608c8e0a61e5752623e6ed23d5c2e196c6b42f0f60812b
                                                • Instruction ID: af799dabbc32ae09d933420d8db73f25c40dca17b3a7f49dc9d610816aa69835
                                                • Opcode Fuzzy Hash: 4862a7eef1a4311bfe608c8e0a61e5752623e6ed23d5c2e196c6b42f0f60812b
                                                • Instruction Fuzzy Hash: BF512E74E002198FDB14CFA9C9855AEFBF2FF89305F248569D418A7355DB319A42CF60

                                                Execution Graph

                                                Execution Coverage:8.6%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:56
                                                Total number of Limit Nodes:8
                                                execution_graph 14966 19fbf08 14969 19fbff0 14966->14969 14967 19fbf17 14970 19fc034 14969->14970 14971 19fc011 14969->14971 14970->14967 14971->14970 14972 19fc238 GetModuleHandleW 14971->14972 14973 19fc265 14972->14973 14973->14967 14974 19f6788 14975 19f67cb DuplicateHandle 14974->14975 14976 19f681e 14975->14976 14977 19f4668 14978 19f4676 14977->14978 14981 19f6de0 14978->14981 14979 19f46e9 14982 19f6e05 14981->14982 14986 19f6edf 14982->14986 14990 19f6ef0 14982->14990 14983 19f6e0f 14983->14979 14987 19f6f17 14986->14987 14988 19f6ff4 14987->14988 14994 19f6414 14987->14994 14991 19f6f17 14990->14991 14992 19f6ff4 14991->14992 14993 19f6414 CreateActCtxA 14991->14993 14992->14992 14993->14992 14995 19f7370 CreateActCtxA 14994->14995 14997 19f7433 14995->14997 14998 19fe120 14999 19fe12d 14998->14999 15000 19fe166 14999->15000 15002 19fc464 14999->15002 15004 19fc46f 15002->15004 15003 19fe1d8 15004->15003 15006 19fc498 15004->15006 15007 19fc4a3 15006->15007 15010 19fe2c0 15007->15010 15008 19fe256 15008->15003 15011 19fe2ee 15010->15011 15013 19fe317 15011->15013 15015 19fe3bf 15011->15015 15016 19fc530 15011->15016 15014 19fe3ba KiUserCallbackDispatcher 15013->15014 15013->15015 15014->15015 15017 19fc53b 15016->15017 15020 19fc5a4 15017->15020 15019 19fe8d5 15019->15013 15021 19fc5af 15020->15021 15022 19fe990 GetFocus 15021->15022 15023 19fe989 15021->15023 15022->15023 15023->15019 15024 19f6540 15025 19f6586 GetCurrentProcess 15024->15025 15027 19f65d8 GetCurrentThread 15025->15027 15028 19f65d1 15025->15028 15029 19f660e 15027->15029 15030 19f6615 GetCurrentProcess 15027->15030 15028->15027 15029->15030 15033 19f664b 15030->15033 15031 19f6673 GetCurrentThreadId 15032 19f66a4 15031->15032 15033->15031

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 019F65BE
                                                • GetCurrentThread.KERNEL32 ref: 019F65FB
                                                • GetCurrentProcess.KERNEL32 ref: 019F6638
                                                • GetCurrentThreadId.KERNEL32 ref: 019F6691
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2370617499.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_19f0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 78a4656d556b123cdf1d1093d3e583e8fd3f12d9557c3dd82ea841deacdad89e
                                                • Instruction ID: 12adbf8b375c24e2bdf6e2de6e320718f47eda637340e8e19e067cfbda5d0610
                                                • Opcode Fuzzy Hash: 78a4656d556b123cdf1d1093d3e583e8fd3f12d9557c3dd82ea841deacdad89e
                                                • Instruction Fuzzy Hash: 235153B0900309AFEB14DFA9D548BAEBFF1AF88304F24845ED508AB290D734A944CB65

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 019F65BE
                                                • GetCurrentThread.KERNEL32 ref: 019F65FB
                                                • GetCurrentProcess.KERNEL32 ref: 019F6638
                                                • GetCurrentThreadId.KERNEL32 ref: 019F6691
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2370617499.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_19f0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: f6a456538dff47acd7c2ded314793f419bd25e08c6b7eb5083290bb6ebb2e764
                                                • Instruction ID: 808ae931286dfdc5b5a1ee6923c29ad035a61d67041d66cc6a94413c35a9f55b
                                                • Opcode Fuzzy Hash: f6a456538dff47acd7c2ded314793f419bd25e08c6b7eb5083290bb6ebb2e764
                                                • Instruction Fuzzy Hash: FB5144B0900309DFEB54DFAAD548B9EBBF5AF88304F24845ED509BB390D734A944CB65

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 49 19fbff0-19fc00f 50 19fc03b-19fc03f 49->50 51 19fc011-19fc01e call 19faf60 49->51 52 19fc053-19fc094 50->52 53 19fc041-19fc04b 50->53 56 19fc034 51->56 57 19fc020 51->57 60 19fc096-19fc09e 52->60 61 19fc0a1-19fc0af 52->61 53->52 56->50 104 19fc026 call 19fc689 57->104 105 19fc026 call 19fc698 57->105 60->61 63 19fc0d3-19fc0d5 61->63 64 19fc0b1-19fc0b6 61->64 62 19fc02c-19fc02e 62->56 65 19fc170-19fc230 62->65 66 19fc0d8-19fc0df 63->66 67 19fc0b8-19fc0bf call 19faf6c 64->67 68 19fc0c1 64->68 99 19fc238-19fc263 GetModuleHandleW 65->99 100 19fc232-19fc235 65->100 71 19fc0ec-19fc0f3 66->71 72 19fc0e1-19fc0e9 66->72 70 19fc0c3-19fc0d1 67->70 68->70 70->66 74 19fc0f5-19fc0fd 71->74 75 19fc100-19fc109 call 19faf7c 71->75 72->71 74->75 80 19fc10b-19fc113 75->80 81 19fc116-19fc11b 75->81 80->81 82 19fc11d-19fc124 81->82 83 19fc139-19fc146 81->83 82->83 85 19fc126-19fc136 call 19faf8c call 19faf9c 82->85 90 19fc169-19fc16f 83->90 91 19fc148-19fc166 83->91 85->83 91->90 101 19fc26c-19fc280 99->101 102 19fc265-19fc26b 99->102 100->99 102->101 104->62 105->62
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 019FC256
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2370617499.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_19f0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: ebc9161f2496d2ab7da8038710e406d2a96f3f7f05f3227e9f0247d4c9beb7d4
                                                • Instruction ID: 985c659ea9e521fe065ffb1aed09ee60a38c25d3ab574edee575ebb9a37262bf
                                                • Opcode Fuzzy Hash: ebc9161f2496d2ab7da8038710e406d2a96f3f7f05f3227e9f0247d4c9beb7d4
                                                • Instruction Fuzzy Hash: 35815970A00B099FDB24DF69D440B9ABBF5FF88300F148A2DD58ADB640D775E846CB91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 106 19f7364-19f7431 CreateActCtxA 108 19f743a-19f7494 106->108 109 19f7433-19f7439 106->109 116 19f7496-19f7499 108->116 117 19f74a3-19f74a7 108->117 109->108 116->117 118 19f74a9-19f74b5 117->118 119 19f74b8 117->119 118->119 121 19f74b9 119->121 121->121
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 019F7421
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2370617499.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_19f0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 563b8650f9ad02f5b906f04b31d66c92b62f0a36b121bc016d58c4477c973fa8
                                                • Instruction ID: 3f14924d8793d57655fc3462d14c3339e94b37125d2982303f2dd167276d208c
                                                • Opcode Fuzzy Hash: 563b8650f9ad02f5b906f04b31d66c92b62f0a36b121bc016d58c4477c973fa8
                                                • Instruction Fuzzy Hash: 5C41DF70C00619CEEB24CFA9C844B9DBBB6BF88704F20816ED518AB251DB755949CF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 122 19f6414-19f7431 CreateActCtxA 125 19f743a-19f7494 122->125 126 19f7433-19f7439 122->126 133 19f7496-19f7499 125->133 134 19f74a3-19f74a7 125->134 126->125 133->134 135 19f74a9-19f74b5 134->135 136 19f74b8 134->136 135->136 138 19f74b9 136->138 138->138
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 019F7421
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2370617499.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_19f0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 81a289c1fa40ba7acb11929488480fe8b63080401df7446b739c7ec88a04e5b1
                                                • Instruction ID: d66b913dfa77b6b1a2250b90f730df0123a3ac349728a545a33181253f6700b5
                                                • Opcode Fuzzy Hash: 81a289c1fa40ba7acb11929488480fe8b63080401df7446b739c7ec88a04e5b1
                                                • Instruction Fuzzy Hash: 8841D1B0C0071DDBEB24DFA9C844B9DBBB6BF88704F20816ED518AB251DB756945CF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 139 19f6780-19f6781 140 19f67cb-19f681c DuplicateHandle 139->140 141 19f6783-19f67c7 139->141 142 19f681e-19f6824 140->142 143 19f6825-19f6842 140->143 141->140 142->143
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 019F680F
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2370617499.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_19f0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: a15d937ec341cafa1de296d6e252d09599e9ab2a0e4f4d988345c6ae626897f6
                                                • Instruction ID: d507991c2dce87561732918234f5c06f18fbe2356aafd0f9252c6fd586b5f6ad
                                                • Opcode Fuzzy Hash: a15d937ec341cafa1de296d6e252d09599e9ab2a0e4f4d988345c6ae626897f6
                                                • Instruction Fuzzy Hash: 8721D4B5D00219EFDB10CFAAD884AEEBBF4FB48310F14841AE918A7250D374A944CFA5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 146 19f6788-19f681c DuplicateHandle 148 19f681e-19f6824 146->148 149 19f6825-19f6842 146->149 148->149
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 019F680F
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2370617499.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_19f0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: d923692cfedfeba11e4403e11d186b3920f6eacdab763c3ce5e2703380034f2f
                                                • Instruction ID: b6db2a8bd19a97295966811b73f26257f69fcf1f6b1fc2cd8151d9854a64af6e
                                                • Opcode Fuzzy Hash: d923692cfedfeba11e4403e11d186b3920f6eacdab763c3ce5e2703380034f2f
                                                • Instruction Fuzzy Hash: D321B5B5D00249AFDB10CF9AD984ADEBFF4EB48310F14841AE918A7250D374A954CFA5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 152 19fc1f0-19fc230 153 19fc238-19fc263 GetModuleHandleW 152->153 154 19fc232-19fc235 152->154 155 19fc26c-19fc280 153->155 156 19fc265-19fc26b 153->156 154->153 156->155
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 019FC256
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2370617499.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_19f0000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 6fc8d86b9edb7efceb7c56cd3fd35ad55a556cdefdaca132bc608e65d2de71f2
                                                • Instruction ID: ee223f90ca1ec30f75ae7577f7933fb5959a9a973699c5559c63203733d0d353
                                                • Opcode Fuzzy Hash: 6fc8d86b9edb7efceb7c56cd3fd35ad55a556cdefdaca132bc608e65d2de71f2
                                                • Instruction Fuzzy Hash: 0B1110B5C003499FDB20DF9AD444BDEFBF8EB88220F10851AD529B7200D379A545CFA1
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2361787784.000000000184D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0184D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_184d000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 996659ff76f4cd0cd835cb27d44684800c0367927b372a4080ba8127e6a8c417
                                                • Instruction ID: 46b9fa1744060e0b4cbc616a70e3338bac83e036bc920d8e2cd9b32ec6f1288a
                                                • Opcode Fuzzy Hash: 996659ff76f4cd0cd835cb27d44684800c0367927b372a4080ba8127e6a8c417
                                                • Instruction Fuzzy Hash: 63213471604308DFDB15DF98D9C0B16BB61FB98318F24C6ADE90A8B342CB7AD507CA61
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.2361787784.000000000184D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0184D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_184d000_Zam#U00f3wienie 89118 _ Metal-Constructions.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c21f20f9b933fcfff6280cc061701e95e78f5f46405777b46ba0931fd6c09a03
                                                • Instruction ID: c9dcce4dcf4e4ea07a8813734334e311ce5250686e653a0175720794a9a239e2
                                                • Opcode Fuzzy Hash: c21f20f9b933fcfff6280cc061701e95e78f5f46405777b46ba0931fd6c09a03
                                                • Instruction Fuzzy Hash: D611BB75504288CFCB16CF58D5C4B15BBA2FB84314F24C6AAD8098B656C33AD50BCBA2

                                                Execution Graph

                                                Execution Coverage:10.3%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:269
                                                Total number of Limit Nodes:16
                                                execution_graph 41421 142acd0 41425 142adb9 41421->41425 41430 142adc8 41421->41430 41422 142acdf 41426 142add9 41425->41426 41427 142adfc 41425->41427 41426->41427 41428 142b000 GetModuleHandleW 41426->41428 41427->41422 41429 142b02d 41428->41429 41429->41422 41431 142adfc 41430->41431 41432 142add9 41430->41432 41431->41422 41432->41431 41433 142b000 GetModuleHandleW 41432->41433 41434 142b02d 41433->41434 41434->41422 41445 142d6a0 DuplicateHandle 41446 142d736 41445->41446 41447 5add1c8 41448 5add208 VirtualAllocEx 41447->41448 41450 5add245 41448->41450 41649 5506e68 41650 5506e95 41649->41650 41662 5506a58 41650->41662 41652 5507057 41667 5506a68 41652->41667 41655 5506a68 2 API calls 41656 55070bb 41655->41656 41657 5506a68 2 API calls 41656->41657 41658 55070ed 41657->41658 41671 550b000 41658->41671 41678 550afef 41658->41678 41659 55071ba 41663 5506a63 41662->41663 41664 5508eb3 41663->41664 41666 1425cec 2 API calls 41663->41666 41685 1428328 41663->41685 41664->41652 41666->41664 41668 5506a73 41667->41668 41669 5507089 41668->41669 41689 5506d34 41668->41689 41669->41655 41672 550b024 41671->41672 41673 550b02b 41671->41673 41672->41659 41677 550b052 41673->41677 41694 5509f8c 41673->41694 41675 550b048 41676 5509f8c GetCurrentThreadId 41675->41676 41676->41677 41677->41659 41679 550b024 41678->41679 41680 550b02b 41678->41680 41679->41659 41681 5509f8c GetCurrentThreadId 41680->41681 41684 550b052 41680->41684 41682 550b048 41681->41682 41683 5509f8c GetCurrentThreadId 41682->41683 41683->41684 41684->41659 41687 142832d 41685->41687 41686 1428629 41686->41664 41687->41686 41688 142cd80 2 API calls 41687->41688 41688->41686 41690 5506d3f 41689->41690 41692 1428328 2 API calls 41690->41692 41693 1425cec 2 API calls 41690->41693 41691 5509ca4 41691->41669 41692->41691 41693->41691 41695 5509f97 41694->41695 41696 550b36f GetCurrentThreadId 41695->41696 41697 550b35a 41695->41697 41696->41697 41697->41675 41435 142d458 41436 142d49e GetCurrentProcess 41435->41436 41438 142d4f0 GetCurrentThread 41436->41438 41439 142d4e9 41436->41439 41440 142d526 41438->41440 41441 142d52d GetCurrentProcess 41438->41441 41439->41438 41440->41441 41444 142d563 41441->41444 41442 142d58b GetCurrentThreadId 41443 142d5bc 41442->41443 41444->41442 41451 1424668 41452 142467a 41451->41452 41453 1424686 41452->41453 41457 1424778 41452->41457 41462 1424218 41453->41462 41455 14246a5 41458 142479d 41457->41458 41466 1424878 41458->41466 41470 1424888 41458->41470 41463 1424223 41462->41463 41478 1425c6c 41463->41478 41465 142706f 41465->41455 41468 14248af 41466->41468 41467 142498c 41467->41467 41468->41467 41474 14244e0 41468->41474 41471 14248af 41470->41471 41472 14244e0 CreateActCtxA 41471->41472 41473 142498c 41471->41473 41472->41473 41475 1425918 CreateActCtxA 41474->41475 41477 14259db 41475->41477 41479 1425c77 41478->41479 41482 1425c8c 41479->41482 41481 1427115 41481->41465 41483 1425c97 41482->41483 41486 1425cbc 41483->41486 41485 14271fa 41485->41481 41487 1425cc7 41486->41487 41490 1425cec 41487->41490 41489 14272ed 41489->41485 41492 1425cf7 41490->41492 41491 1428629 41491->41489 41492->41491 41494 142cd80 41492->41494 41496 142cdb1 41494->41496 41495 142cdd5 41495->41491 41496->41495 41499 142cf40 41496->41499 41503 142cf3f 41496->41503 41500 142cf4d 41499->41500 41502 142cf87 41500->41502 41507 142b7a0 41500->41507 41502->41495 41504 142cf4d 41503->41504 41505 142cf87 41504->41505 41506 142b7a0 2 API calls 41504->41506 41505->41495 41506->41505 41508 142b7ab 41507->41508 41510 142dc98 41508->41510 41511 142d0a4 41508->41511 41510->41510 41512 142d0af 41511->41512 41513 1425cec 2 API calls 41512->41513 41514 142dd07 41513->41514 41517 142fa88 41514->41517 41515 142dd41 41515->41510 41518 142fab9 41517->41518 41519 142fac5 41517->41519 41518->41519 41520 55009c0 CreateWindowExW CreateWindowExW 41518->41520 41521 55009b0 CreateWindowExW CreateWindowExW 41518->41521 41519->41515 41520->41519 41521->41519 41414 5adf5a0 41415 5adf72b 41414->41415 41416 5adf5c6 41414->41416 41416->41415 41418 5ada0a0 41416->41418 41419 5adf820 PostMessageW 41418->41419 41420 5adf88c 41419->41420 41420->41416 41522 5addb82 41523 5addb2d 41522->41523 41524 5addb89 41522->41524 41525 5addb42 41523->41525 41529 5ade3ce 41523->41529 41543 5ade358 41523->41543 41556 5ade368 41523->41556 41530 5ade35c 41529->41530 41532 5ade3d1 41529->41532 41531 5ade38a 41530->41531 41569 5ade8bb 41530->41569 41575 5ade8df 41530->41575 41580 5adea5c 41530->41580 41585 5adeadd 41530->41585 41590 5ade9c3 41530->41590 41594 5ade871 41530->41594 41598 5adea87 41530->41598 41602 5adea37 41530->41602 41608 5ade934 41530->41608 41613 5ade7ab 41530->41613 41531->41525 41532->41525 41544 5ade382 41543->41544 41545 5adeadd 2 API calls 41544->41545 41546 5adea5c 2 API calls 41544->41546 41547 5ade8df ReadProcessMemory 41544->41547 41548 5ade8bb 3 API calls 41544->41548 41549 5ade7ab 2 API calls 41544->41549 41550 5ade934 2 API calls 41544->41550 41551 5adea37 3 API calls 41544->41551 41552 5adea87 2 API calls 41544->41552 41553 5ade871 ReadProcessMemory 41544->41553 41554 5ade9c3 Wow64SetThreadContext 41544->41554 41555 5ade38a 41544->41555 41545->41555 41546->41555 41547->41555 41548->41555 41549->41555 41550->41555 41551->41555 41552->41555 41553->41555 41554->41555 41555->41525 41557 5ade382 41556->41557 41558 5adeadd 2 API calls 41557->41558 41559 5adea5c 2 API calls 41557->41559 41560 5ade8df ReadProcessMemory 41557->41560 41561 5ade8bb 3 API calls 41557->41561 41562 5ade7ab 2 API calls 41557->41562 41563 5ade934 2 API calls 41557->41563 41564 5adea37 3 API calls 41557->41564 41565 5adea87 2 API calls 41557->41565 41566 5ade871 ReadProcessMemory 41557->41566 41567 5ade9c3 Wow64SetThreadContext 41557->41567 41568 5ade38a 41557->41568 41558->41568 41559->41568 41560->41568 41561->41568 41562->41568 41563->41568 41564->41568 41565->41568 41566->41568 41567->41568 41568->41525 41570 5ade8c0 41569->41570 41571 5adeb88 41570->41571 41617 5add0f0 41570->41617 41621 5adc7d0 41571->41621 41625 5adc7cd 41571->41625 41576 5ade883 41575->41576 41578 5ade811 41575->41578 41629 5add378 41576->41629 41581 5adea65 41580->41581 41633 5add280 41581->41633 41637 5add288 41581->41637 41582 5ade811 41582->41531 41586 5ade952 41585->41586 41587 5ade973 41585->41587 41588 5add288 WriteProcessMemory 41586->41588 41589 5add280 WriteProcessMemory 41586->41589 41587->41531 41588->41587 41589->41587 41591 5adf012 41590->41591 41593 5add0f0 Wow64SetThreadContext 41591->41593 41592 5adf02d 41593->41592 41595 5ade882 41594->41595 41597 5add378 ReadProcessMemory 41595->41597 41596 5adeff3 41597->41596 41600 5add288 WriteProcessMemory 41598->41600 41601 5add280 WriteProcessMemory 41598->41601 41599 5adeab5 41600->41599 41601->41599 41603 5adea56 41602->41603 41604 5adeb88 41602->41604 41607 5add0f0 Wow64SetThreadContext 41603->41607 41605 5adc7cd ResumeThread 41604->41605 41606 5adc7d0 ResumeThread 41604->41606 41605->41604 41606->41604 41607->41604 41609 5ade93a 41608->41609 41611 5add288 WriteProcessMemory 41609->41611 41612 5add280 WriteProcessMemory 41609->41612 41610 5ade973 41610->41531 41611->41610 41612->41610 41641 5add510 41613->41641 41645 5add505 41613->41645 41618 5add135 Wow64SetThreadContext 41617->41618 41620 5add17d 41618->41620 41620->41571 41622 5adc810 ResumeThread 41621->41622 41624 5adc841 41622->41624 41624->41571 41626 5adc810 ResumeThread 41625->41626 41628 5adc841 41626->41628 41628->41571 41630 5add3c3 ReadProcessMemory 41629->41630 41632 5add407 41630->41632 41634 5add2d0 WriteProcessMemory 41633->41634 41636 5add327 41634->41636 41636->41582 41638 5add2d0 WriteProcessMemory 41637->41638 41640 5add327 41638->41640 41640->41582 41642 5add599 CreateProcessA 41641->41642 41644 5add75b 41642->41644 41646 5add599 CreateProcessA 41645->41646 41648 5add75b 41646->41648 41698 123d01c 41699 123d034 41698->41699 41700 123d08e 41699->41700 41705 5501a97 41699->41705 41710 5501aa8 41699->41710 41715 5502808 41699->41715 41720 5502818 41699->41720 41706 5501ace 41705->41706 41708 5502818 2 API calls 41706->41708 41709 5502808 2 API calls 41706->41709 41707 5501aef 41707->41700 41708->41707 41709->41707 41711 5501ace 41710->41711 41713 5502818 2 API calls 41711->41713 41714 5502808 2 API calls 41711->41714 41712 5501aef 41712->41700 41713->41712 41714->41712 41716 5502845 41715->41716 41717 5502877 41716->41717 41725 5502d88 41716->41725 41730 5502da8 41716->41730 41721 5502845 41720->41721 41722 5502877 41721->41722 41723 5502d88 2 API calls 41721->41723 41724 5502da8 2 API calls 41721->41724 41723->41722 41724->41722 41727 5502dbc 41725->41727 41726 5502e48 41726->41717 41735 5502e50 41727->41735 41738 5502e60 41727->41738 41732 5502dbc 41730->41732 41731 5502e48 41731->41717 41733 5502e50 2 API calls 41732->41733 41734 5502e60 2 API calls 41732->41734 41733->41731 41734->41731 41736 5502e71 41735->41736 41741 5504022 41735->41741 41736->41726 41739 5502e71 41738->41739 41740 5504022 2 API calls 41738->41740 41739->41726 41740->41739 41745 5504040 41741->41745 41749 5504050 41741->41749 41742 550403a 41742->41736 41746 5504092 41745->41746 41748 5504099 41745->41748 41747 55040ea CallWindowProcW 41746->41747 41746->41748 41747->41748 41748->41742 41750 5504092 41749->41750 41751 5504099 41749->41751 41750->41751 41752 55040ea CallWindowProcW 41750->41752 41751->41742 41752->41751 41753 7771248 CloseHandle 41754 77712a2 41753->41754

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 0142D4D6
                                                • GetCurrentThread.KERNEL32 ref: 0142D513
                                                • GetCurrentProcess.KERNEL32 ref: 0142D550
                                                • GetCurrentThreadId.KERNEL32 ref: 0142D5A9
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2384834041.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_1420000_workbook.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: c5be7effd111cad878d1aba8a01f9be560a7b69a7b81b13a0b7e698ba0b1d0e0
                                                • Instruction ID: 067c0e3ddcb97f64cfda5527c48fb47bc8294ba95ce1627489343748798c08c6
                                                • Opcode Fuzzy Hash: c5be7effd111cad878d1aba8a01f9be560a7b69a7b81b13a0b7e698ba0b1d0e0
                                                • Instruction Fuzzy Hash: BD517AB0D003499FEB54CFA9D548BAEBBF1EF88304F24845AE109A73A0D7745984CF65

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 0142D4D6
                                                • GetCurrentThread.KERNEL32 ref: 0142D513
                                                • GetCurrentProcess.KERNEL32 ref: 0142D550
                                                • GetCurrentThreadId.KERNEL32 ref: 0142D5A9
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2384834041.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_1420000_workbook.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 5c6d6b45a5632f344d9c9982913428cae6e6c8b41937279b79fe4553517cee70
                                                • Instruction ID: 9d12d591c73feb0bab1a872e541c7ab891d16f31ba8db70e6d6bbe675d7bf4da
                                                • Opcode Fuzzy Hash: 5c6d6b45a5632f344d9c9982913428cae6e6c8b41937279b79fe4553517cee70
                                                • Instruction Fuzzy Hash: 065157B0D003499FEB54DFA9D548B9EBBF1EF88304F24845AE109A73A0D774A984CB65

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 431 5add505-5add5a5 433 5add5de-5add5fe 431->433 434 5add5a7-5add5b1 431->434 441 5add637-5add666 433->441 442 5add600-5add60a 433->442 434->433 435 5add5b3-5add5b5 434->435 436 5add5d8-5add5db 435->436 437 5add5b7-5add5c1 435->437 436->433 439 5add5c5-5add5d4 437->439 440 5add5c3 437->440 439->439 443 5add5d6 439->443 440->439 448 5add69f-5add759 CreateProcessA 441->448 449 5add668-5add672 441->449 442->441 444 5add60c-5add60e 442->444 443->436 446 5add631-5add634 444->446 447 5add610-5add61a 444->447 446->441 450 5add61c 447->450 451 5add61e-5add62d 447->451 462 5add75b-5add761 448->462 463 5add762-5add7e8 448->463 449->448 452 5add674-5add676 449->452 450->451 451->451 453 5add62f 451->453 454 5add699-5add69c 452->454 455 5add678-5add682 452->455 453->446 454->448 457 5add684 455->457 458 5add686-5add695 455->458 457->458 458->458 459 5add697 458->459 459->454 462->463 473 5add7f8-5add7fc 463->473 474 5add7ea-5add7ee 463->474 476 5add80c-5add810 473->476 477 5add7fe-5add802 473->477 474->473 475 5add7f0 474->475 475->473 479 5add820-5add824 476->479 480 5add812-5add816 476->480 477->476 478 5add804 477->478 478->476 481 5add836-5add83d 479->481 482 5add826-5add82c 479->482 480->479 483 5add818 480->483 484 5add83f-5add84e 481->484 485 5add854 481->485 482->481 483->479 484->485 487 5add855 485->487 487->487
                                                APIs
                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05ADD746
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2425157602.0000000005AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_5ad0000_workbook.jbxd
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: 8035011370f4232bbcdb71827abbd2f1346a43636907f9417aa20241d319e648
                                                • Instruction ID: 370a22fe1494aa0075fdd70922c42dee82b0f52716457da92b9cd170cfdbff66
                                                • Opcode Fuzzy Hash: 8035011370f4232bbcdb71827abbd2f1346a43636907f9417aa20241d319e648
                                                • Instruction Fuzzy Hash: 5EA16E71D00259DFEB20DFA9C844BEDFBB2BF44314F0481AAD81AA7240DB759985CFA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 488 5add510-5add5a5 490 5add5de-5add5fe 488->490 491 5add5a7-5add5b1 488->491 498 5add637-5add666 490->498 499 5add600-5add60a 490->499 491->490 492 5add5b3-5add5b5 491->492 493 5add5d8-5add5db 492->493 494 5add5b7-5add5c1 492->494 493->490 496 5add5c5-5add5d4 494->496 497 5add5c3 494->497 496->496 500 5add5d6 496->500 497->496 505 5add69f-5add759 CreateProcessA 498->505 506 5add668-5add672 498->506 499->498 501 5add60c-5add60e 499->501 500->493 503 5add631-5add634 501->503 504 5add610-5add61a 501->504 503->498 507 5add61c 504->507 508 5add61e-5add62d 504->508 519 5add75b-5add761 505->519 520 5add762-5add7e8 505->520 506->505 509 5add674-5add676 506->509 507->508 508->508 510 5add62f 508->510 511 5add699-5add69c 509->511 512 5add678-5add682 509->512 510->503 511->505 514 5add684 512->514 515 5add686-5add695 512->515 514->515 515->515 516 5add697 515->516 516->511 519->520 530 5add7f8-5add7fc 520->530 531 5add7ea-5add7ee 520->531 533 5add80c-5add810 530->533 534 5add7fe-5add802 530->534 531->530 532 5add7f0 531->532 532->530 536 5add820-5add824 533->536 537 5add812-5add816 533->537 534->533 535 5add804 534->535 535->533 538 5add836-5add83d 536->538 539 5add826-5add82c 536->539 537->536 540 5add818 537->540 541 5add83f-5add84e 538->541 542 5add854 538->542 539->538 540->536 541->542 544 5add855 542->544 544->544
                                                APIs
                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05ADD746
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2425157602.0000000005AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_5ad0000_workbook.jbxd
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: ccb23e63f82614c217632d0097611c6e67e644dca6640ce47ee51b6d48f33378
                                                • Instruction ID: 98d287abacce419d8256d7f1de173cb03ca57a3326955767fb3072c9ebc6efa1
                                                • Opcode Fuzzy Hash: ccb23e63f82614c217632d0097611c6e67e644dca6640ce47ee51b6d48f33378
                                                • Instruction Fuzzy Hash: 6D916E71D00259DFEB20DF69C840BEDFBB2BF44314F14856AD81AA7240DB759985CFA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 545 142adc8-142add7 546 142ae03-142ae07 545->546 547 142add9-142ade6 call 142a120 545->547 548 142ae1b-142ae5c 546->548 549 142ae09-142ae13 546->549 554 142ade8 547->554 555 142adfc 547->555 556 142ae69-142ae77 548->556 557 142ae5e-142ae66 548->557 549->548 600 142adee call 142b050 554->600 601 142adee call 142b060 554->601 555->546 559 142ae9b-142ae9d 556->559 560 142ae79-142ae7e 556->560 557->556 558 142adf4-142adf6 558->555 561 142af38-142aff8 558->561 562 142aea0-142aea7 559->562 563 142ae80-142ae87 call 142a12c 560->563 564 142ae89 560->564 595 142b000-142b02b GetModuleHandleW 561->595 596 142affa-142affd 561->596 566 142aeb4-142aebb 562->566 567 142aea9-142aeb1 562->567 565 142ae8b-142ae99 563->565 564->565 565->562 569 142aec8-142aed1 call 142a13c 566->569 570 142aebd-142aec5 566->570 567->566 576 142aed3-142aedb 569->576 577 142aede-142aee3 569->577 570->569 576->577 578 142af01-142af0e 577->578 579 142aee5-142aeec 577->579 585 142af10-142af2e 578->585 586 142af31-142af37 578->586 579->578 581 142aeee-142aefe call 142a14c call 142a15c 579->581 581->578 585->586 597 142b034-142b048 595->597 598 142b02d-142b033 595->598 596->595 598->597 600->558 601->558
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0142B01E
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2384834041.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_1420000_workbook.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: edbefc4ee6b851e3afd5d1df362945731b7d473ef25f54bfba666bc25a7cdc67
                                                • Instruction ID: 35311f9c12b758ca8c8a07179437726d7bdd896c0503ce7bb6d4ec55a3d5bd1f
                                                • Opcode Fuzzy Hash: edbefc4ee6b851e3afd5d1df362945731b7d473ef25f54bfba666bc25a7cdc67
                                                • Instruction Fuzzy Hash: 25713670A00B158FD724DF29D45475ABBF1FF88210F60892ED58AD7B50D775E846CB90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 602 55018e4-5501956 603 5501961-5501968 602->603 604 5501958-550195e 602->604 605 5501973-5501a12 CreateWindowExW 603->605 606 550196a-5501970 603->606 604->603 608 5501a14-5501a1a 605->608 609 5501a1b-5501a53 605->609 606->605 608->609 613 5501a60 609->613 614 5501a55-5501a58 609->614 615 5501a61 613->615 614->613 615->615
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05501A02
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2423821278.0000000005500000.00000040.00000800.00020000.00000000.sdmp, Offset: 05500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_5500000_workbook.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: c38c9e921d7787fb91cb3c4751f57abc9f7b8591302dde3692265fb2ab0a5aad
                                                • Instruction ID: d52c01949983faed6a454a578021c3f9305efeb63e0ffc0a6b96ae6e65fbf4ec
                                                • Opcode Fuzzy Hash: c38c9e921d7787fb91cb3c4751f57abc9f7b8591302dde3692265fb2ab0a5aad
                                                • Instruction Fuzzy Hash: ED51B0B1D00359DFDF14CFA9C884ADEBBB5BF88310F24812AE819AB250D7759945CF91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 616 55018f0-5501956 617 5501961-5501968 616->617 618 5501958-550195e 616->618 619 5501973-5501a12 CreateWindowExW 617->619 620 550196a-5501970 617->620 618->617 622 5501a14-5501a1a 619->622 623 5501a1b-5501a53 619->623 620->619 622->623 627 5501a60 623->627 628 5501a55-5501a58 623->628 629 5501a61 627->629 628->627 629->629
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05501A02
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2423821278.0000000005500000.00000040.00000800.00020000.00000000.sdmp, Offset: 05500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_5500000_workbook.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: b6cf120ed093d66a87f127f76f28ddc22245d9344be4a0ddb77ea090d5650d3a
                                                • Instruction ID: e9b8972e97023458a9fa46b08956b1a0ca54f07b136500a935b02f269e35fe89
                                                • Opcode Fuzzy Hash: b6cf120ed093d66a87f127f76f28ddc22245d9344be4a0ddb77ea090d5650d3a
                                                • Instruction Fuzzy Hash: C341B0B1D00359DFDF14CF99C884ADEBBB5BF88310F24812AE819AB250D775A945CF91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 630 142590d-14259d9 CreateActCtxA 632 14259e2-1425a3c 630->632 633 14259db-14259e1 630->633 640 1425a4b-1425a4f 632->640 641 1425a3e-1425a41 632->641 633->632 642 1425a60 640->642 643 1425a51-1425a5d 640->643 641->640 644 1425a61 642->644 643->642 644->644
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 014259C9
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2384834041.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_1420000_workbook.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 440eff64a5315dd33eed12f25ad220715ecbfff0b35752c6f6ddc1a04bc6febe
                                                • Instruction ID: 1ff83d033009bcaa1ae018627803951414c3e3a3e5af265667b2903c7c5499ed
                                                • Opcode Fuzzy Hash: 440eff64a5315dd33eed12f25ad220715ecbfff0b35752c6f6ddc1a04bc6febe
                                                • Instruction Fuzzy Hash: BE41E271C0071DCBEB24CFA9C8857DEBBB5BF89304F64816AD408AB251D775598ACF50

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 646 14244e0-14259d9 CreateActCtxA 649 14259e2-1425a3c 646->649 650 14259db-14259e1 646->650 657 1425a4b-1425a4f 649->657 658 1425a3e-1425a41 649->658 650->649 659 1425a60 657->659 660 1425a51-1425a5d 657->660 658->657 661 1425a61 659->661 660->659 661->661
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 014259C9
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2384834041.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_1420000_workbook.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 02bee4947c61306e9026e59eea368df6e35d2d6e31c94f6bf9507e2b3fb122e1
                                                • Instruction ID: 51fce7d1f96ff360eb7cd1bfc96c13759f46d289e864dd78ab163d16dfe9dc45
                                                • Opcode Fuzzy Hash: 02bee4947c61306e9026e59eea368df6e35d2d6e31c94f6bf9507e2b3fb122e1
                                                • Instruction Fuzzy Hash: DE41F270C0072DCBEB24DFA9C8447DEBBB5BF48704F60816AD508AB251DB75A986CF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 663 5504050-550408c 664 5504092-5504097 663->664 665 550413c-550415c 663->665 666 5504099-55040d0 664->666 667 55040ea-5504122 CallWindowProcW 664->667 672 550415f-550416c 665->672 673 55040d2-55040d8 666->673 674 55040d9-55040e8 666->674 668 5504124-550412a 667->668 669 550412b-550413a 667->669 668->669 669->672 673->674 674->672
                                                APIs
                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 05504111
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2423821278.0000000005500000.00000040.00000800.00020000.00000000.sdmp, Offset: 05500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_5500000_workbook.jbxd
                                                Similarity
                                                • API ID: CallProcWindow
                                                • String ID:
                                                • API String ID: 2714655100-0
                                                • Opcode ID: 70aba26535e9a6186eb1264bcfa9d15c8572574eabbffd9bee2e40d2b237fbcd
                                                • Instruction ID: 7754639cdb1867cf8b48f5ec6181becce887135adf39510979662161f5760a86
                                                • Opcode Fuzzy Hash: 70aba26535e9a6186eb1264bcfa9d15c8572574eabbffd9bee2e40d2b237fbcd
                                                • Instruction Fuzzy Hash: ED4147B8A00309DFCB14CF99C848AAABBF5FF88314F25C459D519AB361D374A841CFA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1064 5add280-5add2d6 1066 5add2d8-5add2e4 1064->1066 1067 5add2e6-5add325 WriteProcessMemory 1064->1067 1066->1067 1069 5add32e-5add35e 1067->1069 1070 5add327-5add32d 1067->1070 1070->1069
                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05ADD318
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2425157602.0000000005AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_5ad0000_workbook.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: d91acb6cf4ee541f4044826c8c72736984e57f9fe76daae421296a42bfaae730
                                                • Instruction ID: b3baae952faa5bd0376da4e856f857f64b033dbecc3d45bf589694ad54711fe8
                                                • Opcode Fuzzy Hash: d91acb6cf4ee541f4044826c8c72736984e57f9fe76daae421296a42bfaae730
                                                • Instruction Fuzzy Hash: B42144759003499FDB10DFA9C885BEEBBF5FF48310F14842AE919A7240D7789945CBA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1074 142d698-142d69c 1075 142d6e2-142d734 DuplicateHandle 1074->1075 1076 142d69e-142d6df 1074->1076 1077 142d736-142d73c 1075->1077 1078 142d73d-142d75a 1075->1078 1076->1075 1077->1078
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0142D727
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2384834041.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_1420000_workbook.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 66ab338e0667b52fb8560327ef73870084b0361c062b48a6776a8a0231152ea8
                                                • Instruction ID: 86096fe2eeaa7a22ed9b154e26db552d31581836c2621be9d68a2d0a7ca45e29
                                                • Opcode Fuzzy Hash: 66ab338e0667b52fb8560327ef73870084b0361c062b48a6776a8a0231152ea8
                                                • Instruction Fuzzy Hash: 802137B5C002899FDB20CFA9D484ADEFFF5AB49320F14815AE958A7351C378A945CF60

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1081 5add288-5add2d6 1083 5add2d8-5add2e4 1081->1083 1084 5add2e6-5add325 WriteProcessMemory 1081->1084 1083->1084 1086 5add32e-5add35e 1084->1086 1087 5add327-5add32d 1084->1087 1087->1086
                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05ADD318
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2425157602.0000000005AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_5ad0000_workbook.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: f4233da4e23ead627f515e05d9885acb58c5364fb001fb0fe8a723a0147ca518
                                                • Instruction ID: 52ca0c92bb3c2d65202eb0ec5251c0292dbec909216c3dffdf489a37ff88ab88
                                                • Opcode Fuzzy Hash: f4233da4e23ead627f515e05d9885acb58c5364fb001fb0fe8a723a0147ca518
                                                • Instruction Fuzzy Hash: 622125759003499FDF10DFA9C885BDEBBF5FF48310F10842AE919A7240D7789944CBA0
                                                APIs
                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 05ADD16E
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2425157602.0000000005AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_5ad0000_workbook.jbxd
                                                Similarity
                                                • API ID: ContextThreadWow64
                                                • String ID:
                                                • API String ID: 983334009-0
                                                • Opcode ID: 7b3aed7928f22cf9130540b06f21a1dfa3ed72d510ed118dff71fa88f972abc7
                                                • Instruction ID: 9d79e69dda71de657e87dc4fcf3ed905191e0e38e4575fac93c0dc73eb8cc789
                                                • Opcode Fuzzy Hash: 7b3aed7928f22cf9130540b06f21a1dfa3ed72d510ed118dff71fa88f972abc7
                                                • Instruction Fuzzy Hash: 8C2107719003099FDB10DFAAC885BAEFBF4FF88214F14842AD519A7240D778A945CBA0
                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05ADD3F8
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2425157602.0000000005AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_5ad0000_workbook.jbxd
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: c6762544b3b4147c8de3b3b8ef85718821afee2f9697d88e091bc1cfe9907536
                                                • Instruction ID: 799d7152145f24395b43b1830c208fc394870dc0dcbbd9e51f79f0e4e5c1f39e
                                                • Opcode Fuzzy Hash: c6762544b3b4147c8de3b3b8ef85718821afee2f9697d88e091bc1cfe9907536
                                                • Instruction Fuzzy Hash: 8A212871C003499FDB10DFAAD884AEEFBF5FF48310F50842AE519A7240D7799904CBA0
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0142D727
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2384834041.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_1420000_workbook.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 7f9a4f52221918f1b3cbebd16ed45f9d88a66aba463ecc35a36438e9a3a5bf3f
                                                • Instruction ID: dbe8d6ebcddd468c2ee5783afaed2cbf27a2d61727314bd2c2b297d52ded20ea
                                                • Opcode Fuzzy Hash: 7f9a4f52221918f1b3cbebd16ed45f9d88a66aba463ecc35a36438e9a3a5bf3f
                                                • Instruction Fuzzy Hash: 8321B5B5D002599FDB10CF9AD584ADEBBF4FB48310F14841AE914A7350D378A954CF65
                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05ADD236
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2425157602.0000000005AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_5ad0000_workbook.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 759190e549cd586f04a13930f4f3facba7f9f1b39f5e8ca7660a90cbf09fbdff
                                                • Instruction ID: f8bfba1c92b9eaafe7371f6b0c96a056bc0f98acc4f5ae78b0a74d4588583371
                                                • Opcode Fuzzy Hash: 759190e549cd586f04a13930f4f3facba7f9f1b39f5e8ca7660a90cbf09fbdff
                                                • Instruction Fuzzy Hash: DB1147719003499FDB10DFA9D844AEFBFF5EF88320F14841AE519A7250C775A945CFA0
                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05ADD236
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2425157602.0000000005AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_5ad0000_workbook.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 6475642906bf5f1c2e69f5711208278b4f82b06f551743ad48ab6df0ed6f16a7
                                                • Instruction ID: 431ebf70799e12e242e5681d57b4731227a8abb7316477bd0fb99e298529910c
                                                • Opcode Fuzzy Hash: 6475642906bf5f1c2e69f5711208278b4f82b06f551743ad48ab6df0ed6f16a7
                                                • Instruction Fuzzy Hash: 4A1126718002499FDB10DFAAD844BDEFBF5BF88310F14841AE519A7250C775A944CBA0
                                                APIs
                                                • ResumeThread.KERNELBASE(?), ref: 05ADC832
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2425157602.0000000005AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_5ad0000_workbook.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: 2d2131153508f4997fe82adbeac6deb6d88711400a2ddd039603d1d01d5ce9cf
                                                • Instruction ID: 659880423ea3c5e60cd364a2ed421d511713bf785e8be3f108e0afefe2cf1302
                                                • Opcode Fuzzy Hash: 2d2131153508f4997fe82adbeac6deb6d88711400a2ddd039603d1d01d5ce9cf
                                                • Instruction Fuzzy Hash: 1E111671D002498FDB20DFAAD485BEEFBF5AB88324F24841AD51AA7240C7795945CFA0
                                                APIs
                                                • ResumeThread.KERNELBASE(?), ref: 05ADC832
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2425157602.0000000005AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_5ad0000_workbook.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: aa685af6ac7f799a4f1597a8fea4c68ecf1c2228da427c9ec22705d2b653311f
                                                • Instruction ID: cff940787063a111490804f555ffcb9302951cc80ed3b7eb0c7cd4c0c14eaa79
                                                • Opcode Fuzzy Hash: aa685af6ac7f799a4f1597a8fea4c68ecf1c2228da427c9ec22705d2b653311f
                                                • Instruction Fuzzy Hash: EB113671D003498FDB20DFAAD845B9EFBF5EF88724F24841AD51AA7240C779A944CFA0
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0142B01E
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2384834041.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_1420000_workbook.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 86260b7a83472bbbb0923f532455bf0a03c7dc36b187e4a6648d1b0e6ebc607b
                                                • Instruction ID: 77cbc6001c5fdf44ebf2c071e810057776215d0a0ea56848336f8e2cac4ac138
                                                • Opcode Fuzzy Hash: 86260b7a83472bbbb0923f532455bf0a03c7dc36b187e4a6648d1b0e6ebc607b
                                                • Instruction Fuzzy Hash: B2110FB5C007498FDB20CF9AD444B9EFBF4EB88314F14841AD528A7210D379A545CFA1
                                                APIs
                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 05ADF87D
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2425157602.0000000005AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_5ad0000_workbook.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: aac8a51dfe210948880d9d86bd713953737aadf7f0a56a5e05da3918d9655ffd
                                                • Instruction ID: 6cd6302af3bb7caeb4ee9e2f77d2efdd004cfc53956151e87b921ad60a965820
                                                • Opcode Fuzzy Hash: aac8a51dfe210948880d9d86bd713953737aadf7f0a56a5e05da3918d9655ffd
                                                • Instruction Fuzzy Hash: 1811E0B58003499FDB10DF9AD448BDEFBF8FB48320F10845AE919A7200C375A984CFA5
                                                APIs
                                                • CloseHandle.KERNELBASE(?), ref: 077712A0
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2425756531.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7770000_workbook.jbxd
                                                Similarity
                                                • API ID: CloseHandle
                                                • String ID:
                                                • API String ID: 2962429428-0
                                                • Opcode ID: 6c75923964995bd93d939cc81c4e96fbbe37cb9fb1a0640a1f6829286e9c7e38
                                                • Instruction ID: 7d26da6667ba65d31d939d73af83e7c84a7f6dc30bb81dc3a7ecf2bd0a7ddec2
                                                • Opcode Fuzzy Hash: 6c75923964995bd93d939cc81c4e96fbbe37cb9fb1a0640a1f6829286e9c7e38
                                                • Instruction Fuzzy Hash: 3B1103B580024ADFDB20DF99D545BDEBBF4EB88320F14841AD959A7340D378A544CFA5
                                                APIs
                                                • CloseHandle.KERNELBASE(?), ref: 077712A0
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2425756531.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7770000_workbook.jbxd
                                                Similarity
                                                • API ID: CloseHandle
                                                • String ID:
                                                • API String ID: 2962429428-0
                                                • Opcode ID: d73e113a1c43863da2d9a6a580e4dc633a17ba668866a26b401e0e1e6b5b19a1
                                                • Instruction ID: 392dc4192f9b4475b411a4b899b17810de834892fe6040ff2ed1b5cf819979a2
                                                • Opcode Fuzzy Hash: d73e113a1c43863da2d9a6a580e4dc633a17ba668866a26b401e0e1e6b5b19a1
                                                • Instruction Fuzzy Hash: 751103B5800349DFDB20DF9AD545BDEBBF4EB88320F14841AD958A7341D378A544CFA5
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2378361928.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_122d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 193ccf4824505ddfa710b12325b7ded0cafa4a9ef565fba022a279ab9c7a7872
                                                • Instruction ID: 27ea00f27a4059ec3bbad67961243cba0e95b7ae9ee2a0bbb0244b511c21be6f
                                                • Opcode Fuzzy Hash: 193ccf4824505ddfa710b12325b7ded0cafa4a9ef565fba022a279ab9c7a7872
                                                • Instruction Fuzzy Hash: 3D214871510248EFDB01DF58E9C0F2ABF61FB88318F24C56DE9050B256C3B6E466CAA1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2379604824.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_123d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2946dfedb2642b0e0ae3c57956cd05937d730ca0c723af1faf63aaa95f936d5a
                                                • Instruction ID: d2c5ffa9cce53296f683fc0b8dad9cd44376f3ce645d76f0c1d5587d08494ce0
                                                • Opcode Fuzzy Hash: 2946dfedb2642b0e0ae3c57956cd05937d730ca0c723af1faf63aaa95f936d5a
                                                • Instruction Fuzzy Hash: 512122B5614208DFDB15DFA8D9C0B16FB65FBC8B14F64C5ADE90A0B242C37AD407CA61
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2379604824.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_123d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 87fd0b71592e14effc27d309ed49d2287787a46978ae4b1b040cf171efeeb5d5
                                                • Instruction ID: 7720ab46b4429d31c7866dc587c08bd2ba613d4f459e85ff5d8c3e50ca7de474
                                                • Opcode Fuzzy Hash: 87fd0b71592e14effc27d309ed49d2287787a46978ae4b1b040cf171efeeb5d5
                                                • Instruction Fuzzy Hash: F621B3B14083849FCB02CF64D994711BF71EB86314F28C5DAD9498F2A7C33A980ACB62
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2378361928.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_122d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a9b31bad3e5d6eb0f96c4d965fb2c37b7b820b0d943b1868179f970c6fb30aa6
                                                • Instruction ID: 45e4e707c3540d698fe8bc6ac2a27d4939cf1b9733fdeeea5760b9011438fb93
                                                • Opcode Fuzzy Hash: a9b31bad3e5d6eb0f96c4d965fb2c37b7b820b0d943b1868179f970c6fb30aa6
                                                • Instruction Fuzzy Hash: 1E110376404284DFCB12CF54D5C0B1ABF71FB84314F24C6A9E9090B257C33AD46ACBA1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2378361928.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_122d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 675ceaa6a61bc812a93af4c6b3dc9e1c18267fdd86aac8407991bb2d8d2e50dd
                                                • Instruction ID: 43cbb98c0c51e30dd9fbfe6dca72a1b1258b6f2cb5e10544ca4d766b4ceabfe0
                                                • Opcode Fuzzy Hash: 675ceaa6a61bc812a93af4c6b3dc9e1c18267fdd86aac8407991bb2d8d2e50dd
                                                • Instruction Fuzzy Hash: C4012B31014398FAF7244F59CC80B6AFF98EF41720F18841AEE084A282C37CD440C671
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2378361928.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_122d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fc0db8653d5dcb79918ca58c1fd91189c55d65cca8ddc15c1893e94eae9b4302
                                                • Instruction ID: ae0ee987f4459f2b0ec6a7d1f0275d1404e1cd6146b2ce9d575a5b9914baf632
                                                • Opcode Fuzzy Hash: fc0db8653d5dcb79918ca58c1fd91189c55d65cca8ddc15c1893e94eae9b4302
                                                • Instruction Fuzzy Hash: 48F06871405354AEE7258E19DC84B66FFA8EF41724F18C55AEE085A286C37D9844CA71

                                                Execution Graph

                                                Execution Coverage:8.9%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:76
                                                Total number of Limit Nodes:7
                                                execution_graph 20490 337d6a0 DuplicateHandle 20491 337d736 20490->20491 20492 7741248 CloseHandle 20493 77412a2 20492->20493 20494 3374668 20495 337467a 20494->20495 20496 3374686 20495->20496 20500 3374778 20495->20500 20505 3374218 20496->20505 20498 33746a5 20501 337479d 20500->20501 20509 3374878 20501->20509 20513 3374888 20501->20513 20506 3374223 20505->20506 20521 3375c6c 20506->20521 20508 337706f 20508->20498 20510 3374882 20509->20510 20511 337498c 20510->20511 20517 33744e0 20510->20517 20515 33748af 20513->20515 20514 337498c 20514->20514 20515->20514 20516 33744e0 CreateActCtxA 20515->20516 20516->20514 20518 3375918 CreateActCtxA 20517->20518 20520 33759db 20518->20520 20522 3375c77 20521->20522 20525 3375c8c 20522->20525 20524 3377115 20524->20508 20526 3375c97 20525->20526 20529 3375cbc 20526->20529 20528 33771fa 20528->20524 20530 3375cc7 20529->20530 20533 3375cec 20530->20533 20532 33772ed 20532->20528 20534 3375cf7 20533->20534 20536 33785eb 20534->20536 20539 337ac98 20534->20539 20535 3378629 20535->20532 20536->20535 20543 337cd80 20536->20543 20548 337acd0 20539->20548 20551 337acbf 20539->20551 20540 337acae 20540->20536 20544 337cdb1 20543->20544 20545 337cdd5 20544->20545 20560 337cf31 20544->20560 20565 337cf40 20544->20565 20545->20535 20555 337adc8 20548->20555 20549 337acdf 20549->20540 20552 337acd0 20551->20552 20554 337adc8 GetModuleHandleW 20552->20554 20553 337acdf 20553->20540 20554->20553 20556 337adfc 20555->20556 20557 337add9 20555->20557 20556->20549 20557->20556 20558 337b000 GetModuleHandleW 20557->20558 20559 337b02d 20558->20559 20559->20549 20561 337ceeb 20560->20561 20562 337cf3a 20560->20562 20561->20545 20563 337cf87 20562->20563 20569 337b7a0 20562->20569 20563->20545 20566 337cf4d 20565->20566 20567 337cf87 20566->20567 20568 337b7a0 GetModuleHandleW 20566->20568 20567->20545 20568->20567 20570 337b7ab 20569->20570 20572 337dc98 20570->20572 20573 337d0a4 20570->20573 20572->20572 20574 337d0af 20573->20574 20575 3375cec GetModuleHandleW 20574->20575 20576 337dd07 20575->20576 20576->20572 20577 337d458 20578 337d49e GetCurrentProcess 20577->20578 20580 337d4f0 GetCurrentThread 20578->20580 20581 337d4e9 20578->20581 20582 337d526 20580->20582 20583 337d52d GetCurrentProcess 20580->20583 20581->20580 20582->20583 20586 337d563 20583->20586 20584 337d58b GetCurrentThreadId 20585 337d5bc 20584->20585 20586->20584

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 0337D4D6
                                                • GetCurrentThread.KERNEL32 ref: 0337D513
                                                • GetCurrentProcess.KERNEL32 ref: 0337D550
                                                • GetCurrentThreadId.KERNEL32 ref: 0337D5A9
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2446886241.0000000003370000.00000040.00000800.00020000.00000000.sdmp, Offset: 03370000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_3370000_workbook.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 0152d1d8da780631380345a358f73b201e82a88e208427640cd4048bbcbfe433
                                                • Instruction ID: 6963bbdff31317ab3d405bc9afa5ab3fb668d8e86deacf4b0245a512ec15bdef
                                                • Opcode Fuzzy Hash: 0152d1d8da780631380345a358f73b201e82a88e208427640cd4048bbcbfe433
                                                • Instruction Fuzzy Hash: 525179B0910309CFDB54DFA9D548BAEBBF1EF88314F248459E409A7290D7349944CF65

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 0337D4D6
                                                • GetCurrentThread.KERNEL32 ref: 0337D513
                                                • GetCurrentProcess.KERNEL32 ref: 0337D550
                                                • GetCurrentThreadId.KERNEL32 ref: 0337D5A9
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2446886241.0000000003370000.00000040.00000800.00020000.00000000.sdmp, Offset: 03370000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_3370000_workbook.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 7c04604c536da1fe69b13659d3482575d6a5f4114eb0c5ce74b16e6eb7da306b
                                                • Instruction ID: a013c35e49eeb81ded49816beb45eab2d290aa87770eb4b0cba3ae3a31e96ecd
                                                • Opcode Fuzzy Hash: 7c04604c536da1fe69b13659d3482575d6a5f4114eb0c5ce74b16e6eb7da306b
                                                • Instruction Fuzzy Hash: DF5188B0900309CFDB14DFAAD588B9EBBF1EF88314F248059E409A7250DB389984CF65

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 44 337adc8-337add7 45 337ae03-337ae07 44->45 46 337add9-337ade6 call 337a120 44->46 47 337ae1b-337ae5c 45->47 48 337ae09-337ae13 45->48 51 337adfc 46->51 52 337ade8 46->52 55 337ae5e-337ae66 47->55 56 337ae69-337ae77 47->56 48->47 51->45 99 337adee call 337b060 52->99 100 337adee call 337b050 52->100 55->56 58 337ae9b-337ae9d 56->58 59 337ae79-337ae7e 56->59 57 337adf4-337adf6 57->51 62 337af38-337aff8 57->62 63 337aea0-337aea7 58->63 60 337ae80-337ae87 call 337a12c 59->60 61 337ae89 59->61 65 337ae8b-337ae99 60->65 61->65 94 337b000-337b02b GetModuleHandleW 62->94 95 337affa-337affd 62->95 66 337aeb4-337aebb 63->66 67 337aea9-337aeb1 63->67 65->63 69 337aebd-337aec5 66->69 70 337aec8-337aed1 call 337a13c 66->70 67->66 69->70 75 337aed3-337aedb 70->75 76 337aede-337aee3 70->76 75->76 78 337aee5-337aeec 76->78 79 337af01-337af0e 76->79 78->79 80 337aeee-337aefe call 337a14c call 337a15c 78->80 85 337af31-337af37 79->85 86 337af10-337af2e 79->86 80->79 86->85 96 337b034-337b048 94->96 97 337b02d-337b033 94->97 95->94 97->96 99->57 100->57
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0337B01E
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2446886241.0000000003370000.00000040.00000800.00020000.00000000.sdmp, Offset: 03370000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_3370000_workbook.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 37d8eaf5817e9c61483150575c06876ef5afd3064add9a9e47cac9177b819cbc
                                                • Instruction ID: d818c110b349b32759a68246646df7d9c4d59703bcf32d49ed1e1102a7478862
                                                • Opcode Fuzzy Hash: 37d8eaf5817e9c61483150575c06876ef5afd3064add9a9e47cac9177b819cbc
                                                • Instruction Fuzzy Hash: 44712470A00B058FE724DF2AD49575ABBF5BF88300F148A2DD49ADBB50DB79E845CB90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 101 33744e0-33759d9 CreateActCtxA 104 33759e2-3375a3c 101->104 105 33759db-33759e1 101->105 112 3375a3e-3375a41 104->112 113 3375a4b-3375a4f 104->113 105->104 112->113 114 3375a51-3375a5d 113->114 115 3375a60 113->115 114->115 117 3375a61 115->117 117->117
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 033759C9
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2446886241.0000000003370000.00000040.00000800.00020000.00000000.sdmp, Offset: 03370000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_3370000_workbook.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 35199467252922b690f4b6d73186f4fc92358d964dd9d6f8ab02b16ca6b3fc14
                                                • Instruction ID: 4e0f6942a7030d3a9d8955955d1bdaa8359693bfe99aa7a3d729111338f9def2
                                                • Opcode Fuzzy Hash: 35199467252922b690f4b6d73186f4fc92358d964dd9d6f8ab02b16ca6b3fc14
                                                • Instruction Fuzzy Hash: 6D41E071C0071DCBEB24CFA9C884B8EBBF5BF89704F24816AD409AB255DB756946CF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 118 337590d-33759d9 CreateActCtxA 120 33759e2-3375a3c 118->120 121 33759db-33759e1 118->121 128 3375a3e-3375a41 120->128 129 3375a4b-3375a4f 120->129 121->120 128->129 130 3375a51-3375a5d 129->130 131 3375a60 129->131 130->131 133 3375a61 131->133 133->133
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 033759C9
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2446886241.0000000003370000.00000040.00000800.00020000.00000000.sdmp, Offset: 03370000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_3370000_workbook.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 5a0812a16bba62c2ac359691c14750918b2cbc72311bb5cccc1e3f3317b1c3ac
                                                • Instruction ID: f1b109506f044b8b26ff0485e84e7419e0ddc6d185d10ec3b384309ccd22c445
                                                • Opcode Fuzzy Hash: 5a0812a16bba62c2ac359691c14750918b2cbc72311bb5cccc1e3f3317b1c3ac
                                                • Instruction Fuzzy Hash: EB41F271C0071DCBEB24CFA9C884B8EBBB1BF89704F24816AD409AB251DB756946CF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 134 337d698-337d69c 135 337d6e2-337d734 DuplicateHandle 134->135 136 337d69e-337d6df 134->136 137 337d736-337d73c 135->137 138 337d73d-337d75a 135->138 136->135 137->138
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0337D727
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2446886241.0000000003370000.00000040.00000800.00020000.00000000.sdmp, Offset: 03370000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_3370000_workbook.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 9e7a7d939b80f88591f9e98da2281cd7f14014cdc2d3afec2971c2633fccc0e5
                                                • Instruction ID: 4b95fa6255221fd00e61292e2d8f08e013fcef8369569819ab7ee460f88b882f
                                                • Opcode Fuzzy Hash: 9e7a7d939b80f88591f9e98da2281cd7f14014cdc2d3afec2971c2633fccc0e5
                                                • Instruction Fuzzy Hash: 0A2135B5D00249DFDB10CFA9D984BDEFBF5AF48320F28815AE954A7250C378A945CFA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 141 337d6a0-337d734 DuplicateHandle 142 337d736-337d73c 141->142 143 337d73d-337d75a 141->143 142->143
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0337D727
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2446886241.0000000003370000.00000040.00000800.00020000.00000000.sdmp, Offset: 03370000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_3370000_workbook.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: c9ad93a09b75b22ff0d772179e8f43423c9a2e9fc767a0bb828b23489429b5b9
                                                • Instruction ID: 9bef452e00668930f4ffec1a26225747d59e4c3974ee10c88b5acd6e7e657fc8
                                                • Opcode Fuzzy Hash: c9ad93a09b75b22ff0d772179e8f43423c9a2e9fc767a0bb828b23489429b5b9
                                                • Instruction Fuzzy Hash: B021C4B5D00249DFDB10CFAAD984ADEFBF4EB48310F14841AE914A7350D378A954CFA5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 146 337afb8-337aff8 147 337b000-337b02b GetModuleHandleW 146->147 148 337affa-337affd 146->148 149 337b034-337b048 147->149 150 337b02d-337b033 147->150 148->147 150->149
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0337B01E
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2446886241.0000000003370000.00000040.00000800.00020000.00000000.sdmp, Offset: 03370000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_3370000_workbook.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 105429778e4155fc137b7df0f4ce1a00acb399d9ed7c8f6948708c4e1294d84f
                                                • Instruction ID: 8d8cb2184a6f8468002521e86947e152574b45f8abcde9c54786b41822f0a25a
                                                • Opcode Fuzzy Hash: 105429778e4155fc137b7df0f4ce1a00acb399d9ed7c8f6948708c4e1294d84f
                                                • Instruction Fuzzy Hash: 5A1110B5C043498FCB20CF9AD844BDEFBF4AB88210F14841AD429A7200D379A545CFA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 152 7741241-77412ad CloseHandle 155 77412b6-77412de 152->155 156 77412af-77412b5 152->156 156->155
                                                APIs
                                                • CloseHandle.KERNELBASE(?), ref: 077412A0
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2502244533.0000000007740000.00000040.00000800.00020000.00000000.sdmp, Offset: 07740000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_7740000_workbook.jbxd
                                                Similarity
                                                • API ID: CloseHandle
                                                • String ID:
                                                • API String ID: 2962429428-0
                                                • Opcode ID: 5f54ef68eb0e11cb6b20e747f3c76929de59446a0b698e410b539a193bd6db4e
                                                • Instruction ID: 286971c967c958cdbd9a549bfb7ea9c3c90455ef272d9e339588fa8a99ed225c
                                                • Opcode Fuzzy Hash: 5f54ef68eb0e11cb6b20e747f3c76929de59446a0b698e410b539a193bd6db4e
                                                • Instruction Fuzzy Hash: 771125B1D00249DFCB10DF9AD585BDEBBF4EB48320F25842AD959A7240D378A544CFA5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 159 7741248-77412a0 CloseHandle 160 77412a2-77412ad 159->160 161 77412b6-77412de 160->161 162 77412af-77412b5 160->162 162->161
                                                APIs
                                                • CloseHandle.KERNELBASE(?), ref: 077412A0
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2502244533.0000000007740000.00000040.00000800.00020000.00000000.sdmp, Offset: 07740000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_7740000_workbook.jbxd
                                                Similarity
                                                • API ID: CloseHandle
                                                • String ID:
                                                • API String ID: 2962429428-0
                                                • Opcode ID: e82211d004a32547dbb33e5a615b1f6c61a8128bb8723223348cb0c52a2f1a27
                                                • Instruction ID: 79e34b6388f95d5db30ea6f2c443d9988ce95f977f7716bcd42fcbe496eb071f
                                                • Opcode Fuzzy Hash: e82211d004a32547dbb33e5a615b1f6c61a8128bb8723223348cb0c52a2f1a27
                                                • Instruction Fuzzy Hash: 511133B1D00349CFCB10DF9AD445BDEBBF4EB48320F24841AD958A7240D378A644CFA5
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2446399312.000000000319D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0319D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_319d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d059f2401b06b818e7486d492ef924a5e2e8b0e5c42b506266650858c54d54a3
                                                • Instruction ID: 981a2ffc4ab3b47979a736f199555ac174c7cb1f096faa3abfe2d8e74f19deac
                                                • Opcode Fuzzy Hash: d059f2401b06b818e7486d492ef924a5e2e8b0e5c42b506266650858c54d54a3
                                                • Instruction Fuzzy Hash: 4521D376504244DFEF05DF54E9C0B2ABB65FB8C310F24C5AAE9090F246C37AD456CBA2
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2446399312.000000000319D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0319D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_319d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b53c31c766f4a7cd6151c291d7a89f89c3c52f3e2a89e9816125841be86535e1
                                                • Instruction ID: 3c2fd3e1a2719b482b8d8093c51cf297c639c9073f9710993190612f31b10bc1
                                                • Opcode Fuzzy Hash: b53c31c766f4a7cd6151c291d7a89f89c3c52f3e2a89e9816125841be86535e1
                                                • Instruction Fuzzy Hash: B821C171504244DFEF05DF14E980B26BF75FB88718F2485AAE9094B256C336E456CBA2
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2446502921.00000000031AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 031AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_31ad000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5031dbaeb59f8d410bfd9b30abbe78d026918ebfcf5d10070abf3afa80a0130d
                                                • Instruction ID: fee982bfbcb3e9a235d5fa3d706008c07d230fd4c662a2e237173b9398a0e920
                                                • Opcode Fuzzy Hash: 5031dbaeb59f8d410bfd9b30abbe78d026918ebfcf5d10070abf3afa80a0130d
                                                • Instruction Fuzzy Hash: DF216779104B00DFCB14DF18EAD0B16BB65FB8C315F24C5ADE80A4B642C336D447CA61
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2446502921.00000000031AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 031AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_31ad000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cf9634a2da552d97dec16e08a4a086640d5f9fba8c481688f08fd0189b13ad90
                                                • Instruction ID: b2e9e1a0259bf0818414f0699d12818808f9e7a5e58cdbadaf9c3551cbaebfa2
                                                • Opcode Fuzzy Hash: cf9634a2da552d97dec16e08a4a086640d5f9fba8c481688f08fd0189b13ad90
                                                • Instruction Fuzzy Hash: BF21D4754087809FCB02CF24D994711BF71EF4A314F28C5DAD8498F6A7C33A980ACB62
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2446399312.000000000319D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0319D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_319d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 06959c5ef9f2259c6eb22c0ab2985858efd7d5751cc861002493ff96a7301ed8
                                                • Instruction ID: ebe658fbf10fe11fdd28c837f91f951623b9350f60e7735feaf70ad6bdcc36e7
                                                • Opcode Fuzzy Hash: 06959c5ef9f2259c6eb22c0ab2985858efd7d5751cc861002493ff96a7301ed8
                                                • Instruction Fuzzy Hash: 7D219076504244DFDF06CF50D9C4B16BF61FB88314F28C5AADC050A656C33AD416CB91
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2446399312.000000000319D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0319D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_319d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a9b31bad3e5d6eb0f96c4d965fb2c37b7b820b0d943b1868179f970c6fb30aa6
                                                • Instruction ID: 0c529e5da01110bb465314a008ff03fa68c9b2f0aad7a7a19bc27cb5343f67d7
                                                • Opcode Fuzzy Hash: a9b31bad3e5d6eb0f96c4d965fb2c37b7b820b0d943b1868179f970c6fb30aa6
                                                • Instruction Fuzzy Hash: 3311E676504284CFEF15CF14E5C4B16BF71FB88314F28C6AAD8494B656C33AD45ACBA2
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2446399312.000000000319D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0319D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_319d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dc592cf639a8e9ce89fabffbefe3e2c8e5a555b0f2083b58ed5527aaf91c42ab
                                                • Instruction ID: 98a83976401a03922f3082b2a1cc69987634c5c0ceffae5d81e9ca6c25f5f7e2
                                                • Opcode Fuzzy Hash: dc592cf639a8e9ce89fabffbefe3e2c8e5a555b0f2083b58ed5527aaf91c42ab
                                                • Instruction Fuzzy Hash: 4301F7310043449BFF28CB26EC80B26FB98EF45328F1C885BED090A282C3389440C6B1
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2446399312.000000000319D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0319D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_319d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 35979d2dead79418cc524e716efd925a0da6c17082350091e277ebeaa5269145
                                                • Instruction ID: bbf482cea4fdc88475df155445022dbb9af7f836a536479e1cc9031baa594ce4
                                                • Opcode Fuzzy Hash: 35979d2dead79418cc524e716efd925a0da6c17082350091e277ebeaa5269145
                                                • Instruction Fuzzy Hash: 1DF06271405344AFFB248E1ADC84B62FBA8EF45624F18C55AED085B286C3799844CBB1

                                                Execution Graph

                                                Execution Coverage:9.3%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:45
                                                Total number of Limit Nodes:7
                                                execution_graph 22806 1676540 22807 1676586 GetCurrentProcess 22806->22807 22809 16765d1 22807->22809 22810 16765d8 GetCurrentThread 22807->22810 22809->22810 22811 1676615 GetCurrentProcess 22810->22811 22812 167660e 22810->22812 22813 167664b GetCurrentThreadId 22811->22813 22812->22811 22815 16766a4 22813->22815 22816 167e120 22817 167e12d 22816->22817 22819 167e166 22817->22819 22820 167c464 22817->22820 22821 167c46f 22820->22821 22822 167e1d8 22821->22822 22824 167c498 22821->22824 22825 167c4a3 22824->22825 22828 167e2c0 22825->22828 22826 167e256 22826->22822 22829 167e2ee 22828->22829 22831 167e317 22829->22831 22832 167e3bf 22829->22832 22834 167c530 GetFocus 22829->22834 22831->22832 22833 167e3ba KiUserCallbackDispatcher 22831->22833 22833->22832 22834->22831 22858 167c1f0 22859 167c232 22858->22859 22860 167c238 GetModuleHandleW 22858->22860 22859->22860 22861 167c265 22860->22861 22835 1674668 22838 1674676 22835->22838 22836 16746e9 22839 1676de0 22838->22839 22840 1676e05 22839->22840 22844 1676ef0 22840->22844 22848 1676edf 22840->22848 22841 1676e0f 22841->22836 22846 1676f17 22844->22846 22845 1676ff4 22845->22845 22846->22845 22852 1676414 22846->22852 22849 1676f17 22848->22849 22850 1676414 CreateActCtxA 22849->22850 22851 1676ff4 22849->22851 22850->22851 22853 1677370 CreateActCtxA 22852->22853 22855 1677433 22853->22855 22855->22855 22856 1676788 DuplicateHandle 22857 167681e 22856->22857

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 555 825b6d0-825b6ec 556 825b776-825b7cf 555->556 557 825b6f2-825b6ff 555->557 574 825b7d5-825b7db 556->574 575 825b890-825b8f1 556->575 560 825b716-825b722 557->560 561 825b701-825b70f call 825b110 557->561 566 825b724-825b748 560->566 567 825b74a 560->567 564 825b711-825b714 561->564 568 825b753-825b773 564->568 566->567 566->568 567->568 576 825b805-825b816 574->576 577 825b7dd-825b7e0 574->577 594 825b8f3-825b91a 575->594 595 825b91b-825b969 575->595 582 825b81e-825b822 576->582 583 825b818 576->583 579 825b7e2-825b804 577->579 580 825b85b-825b889 577->580 580->575 586 825b82a-825b85a 582->586 583->586 587 825b81a-825b81c 583->587 587->582 587->586 601 825b979-825b97d 595->601 602 825b96b-825b974 call 825b578 595->602 604 825b993-825b9a4 601->604 605 825b97f-825b98e 601->605 602->601 606 825bea2-825bec2 604->606 607 825b9aa-825b9bf 604->607 608 825bd28-825bd2f 605->608 621 825bec4-825bec8 606->621 622 825bedb-825bf26 606->622 609 825b9c1-825b9c6 607->609 610 825b9cb-825b9de 607->610 609->608 612 825b9e4-825b9f0 610->612 613 825bd30-825bd4e 610->613 612->606 614 825b9f6-825ba2d 612->614 619 825bd55-825bd73 613->619 615 825ba2f-825ba34 614->615 616 825ba39-825ba3d 614->616 615->608 616->619 620 825ba43-825ba4f 616->620 632 825bd7a-825bd98 619->632 620->606 623 825ba55-825ba8c 620->623 625 825bed8-825beda 621->625 626 825beca-825bed5 621->626 651 825bf35-825bf3a 622->651 652 825bf28-825bf34 622->652 627 825ba8e-825ba93 623->627 628 825ba98-825ba9c 623->628 626->625 627->608 631 825baa2-825baae 628->631 628->632 631->606 636 825bab4-825baeb 631->636 644 825bd9f-825bdbd 632->644 639 825baf7-825bafb 636->639 640 825baed-825baf2 636->640 643 825bb01-825bb0d 639->643 639->644 640->608 643->606 646 825bb13-825bb4a 643->646 654 825bdc4-825bde2 644->654 648 825bb56-825bb5a 646->648 649 825bb4c-825bb51 646->649 648->654 655 825bb60-825bb6c 648->655 649->608 656 825bf3c-825bf3f 651->656 657 825bf78-825bf7c 651->657 667 825bde9-825be07 654->667 655->606 659 825bb72-825bba9 655->659 664 825bf6d-825bf76 656->664 660 825bbb5-825bbb9 659->660 661 825bbab-825bbb0 659->661 666 825bbbf-825bbcb 660->666 660->667 661->608 664->657 668 825bf41-825bf55 664->668 666->606 669 825bbd1-825bc08 666->669 675 825be0e-825be2c 667->675 678 825bf57-825bf6b call 8253820 668->678 679 825bf6c 668->679 671 825bc14-825bc18 669->671 672 825bc0a-825bc0f 669->672 671->675 676 825bc1e-825bc2a 671->676 672->608 688 825be33-825be51 675->688 676->606 680 825bc30-825bc67 676->680 679->664 684 825bc73-825bc77 680->684 685 825bc69-825bc6e 680->685 684->688 689 825bc7d-825bc89 684->689 685->608 697 825be58-825be76 688->697 689->606 691 825bc8f-825bcc6 689->691 693 825bccf-825bcd3 691->693 694 825bcc8-825bccd 691->694 696 825bcd9-825bce2 693->696 693->697 694->608 696->606 699 825bce8-825bd1d 696->699 701 825be7d-825be9b 697->701 700 825bd23 699->700 699->701 700->608 701->606
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1d59370df1b9967ecbd31b4f0d8ddf4bbdb1aff610867d754df4d9ddd7280436
                                                • Instruction ID: cc127fb08e56dbc9b02b89c7d9428aa4e0db6b2240b5a8a4d9f2cfb728c01a74
                                                • Opcode Fuzzy Hash: 1d59370df1b9967ecbd31b4f0d8ddf4bbdb1aff610867d754df4d9ddd7280436
                                                • Instruction Fuzzy Hash: E5426A74B106168FCB19CFA9C49467EBBF6FF88321F14852DD95A97380DB34A941CB90

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 016765BE
                                                • GetCurrentThread.KERNEL32 ref: 016765FB
                                                • GetCurrentProcess.KERNEL32 ref: 01676638
                                                • GetCurrentThreadId.KERNEL32 ref: 01676691
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4793945045.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_1670000_workbook.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: a3ed8b12c723aaa81ca0d110014ce45422eb9dd56f1b7f046d56f930fb1d43cd
                                                • Instruction ID: 3be25f20dccebb07b1b5a827ecc700f4343f2563a9e1d895855bb9b6f949b6ea
                                                • Opcode Fuzzy Hash: a3ed8b12c723aaa81ca0d110014ce45422eb9dd56f1b7f046d56f930fb1d43cd
                                                • Instruction Fuzzy Hash: 225178B0900609CFEB44DFA9D948BEEBFF5EB48304F248459D509A7390D7349949CB66

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 016765BE
                                                • GetCurrentThread.KERNEL32 ref: 016765FB
                                                • GetCurrentProcess.KERNEL32 ref: 01676638
                                                • GetCurrentThreadId.KERNEL32 ref: 01676691
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4793945045.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_1670000_workbook.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 108a9695a295e213265a91ea4cff9de5d474e09141f2349ac50cfb69155ed574
                                                • Instruction ID: 4941c499053947e0a87815341f4a148cb84a2f33cd1ad27a8d2a7c178a74b490
                                                • Opcode Fuzzy Hash: 108a9695a295e213265a91ea4cff9de5d474e09141f2349ac50cfb69155ed574
                                                • Instruction Fuzzy Hash: 515177B0900609CFEB48DFA9D948BAEBFF5EF88304F248059E509A7390DB746944CF65

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 50 1676414-1677431 CreateActCtxA 53 1677433-1677439 50->53 54 167743a-1677494 50->54 53->54 61 1677496-1677499 54->61 62 16774a3-16774a7 54->62 61->62 63 16774a9-16774b5 62->63 64 16774b8 62->64 63->64 66 16774b9 64->66 66->66
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 01677421
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4793945045.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_1670000_workbook.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: b4eb52d7811b4d72ff46d4d1809f88fbd08628239c2da1b055f5f0fd6fba080e
                                                • Instruction ID: 024dfa16bd5677ab437b109c2aa9124f83f17f0e8fc51d26946cf6f60b7fe9af
                                                • Opcode Fuzzy Hash: b4eb52d7811b4d72ff46d4d1809f88fbd08628239c2da1b055f5f0fd6fba080e
                                                • Instruction Fuzzy Hash: DA41CF70C0061DCBEB24DFA9C848B9EBBB5BF48704F20816AD508AB255DBB56945CF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 67 1677364-167736b 68 1677370-1677431 CreateActCtxA 67->68 70 1677433-1677439 68->70 71 167743a-1677494 68->71 70->71 78 1677496-1677499 71->78 79 16774a3-16774a7 71->79 78->79 80 16774a9-16774b5 79->80 81 16774b8 79->81 80->81 83 16774b9 81->83 83->83
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 01677421
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4793945045.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_1670000_workbook.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 661ce84adeec2bacb1e842566a48e95161cc43e17352384b85bb8a795a18c124
                                                • Instruction ID: b979fdf67ae3fbcbd05852fcdbf1af97cceec6d2a333f3d38c29672a977a654a
                                                • Opcode Fuzzy Hash: 661ce84adeec2bacb1e842566a48e95161cc43e17352384b85bb8a795a18c124
                                                • Instruction Fuzzy Hash: 2741E271C0071DCBEB24CFA9C844BDEBBB5BF44304F24816AD508AB255DB796949CF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 84 1676780-1676781 85 1676783 84->85 86 167670d 84->86 87 1676788-167681c DuplicateHandle 85->87 88 1676825-1676842 87->88 89 167681e-1676824 87->89 89->88
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0167680F
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4793945045.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_1670000_workbook.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: aa5e20742fde46b13b6c96376877039c3e548d19a38efe279dccd72fa3d28668
                                                • Instruction ID: 9a85726d8ce2800638a41cd73cdad1e2b4d22d69cc10d89c896e6d1ceca35575
                                                • Opcode Fuzzy Hash: aa5e20742fde46b13b6c96376877039c3e548d19a38efe279dccd72fa3d28668
                                                • Instruction Fuzzy Hash: F521E5B5D00208EFDB10CFAAD884AEEBFF8EB48310F14841AE914A3351D374A944CFA5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 92 1676788-167681c DuplicateHandle 93 1676825-1676842 92->93 94 167681e-1676824 92->94 94->93
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0167680F
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4793945045.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_1670000_workbook.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: d97ad1c03c529b5a162cf1db6d300d314b35584096ac1de02e197a48872f5474
                                                • Instruction ID: 05f18c8130515f68e96f8985e3e6c96c67911874b137bbbba216ecbf35bdde2a
                                                • Opcode Fuzzy Hash: d97ad1c03c529b5a162cf1db6d300d314b35584096ac1de02e197a48872f5474
                                                • Instruction Fuzzy Hash: D121B3B59002499FDB10CFAAD984ADEBFF4EB48710F14841AE918A7350D378A954CFA5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 97 167c1f0-167c230 98 167c232-167c235 97->98 99 167c238-167c263 GetModuleHandleW 97->99 98->99 100 167c265-167c26b 99->100 101 167c26c-167c280 99->101 100->101
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0167C256
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4793945045.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_1670000_workbook.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 75c15214556720c74c034e38666b905c1389e94388ee1725b34ae850e3b0d286
                                                • Instruction ID: 34226790a5c46a7320bce3a2f73fb656f65332e92abf95385b8938a65c3870d0
                                                • Opcode Fuzzy Hash: 75c15214556720c74c034e38666b905c1389e94388ee1725b34ae850e3b0d286
                                                • Instruction Fuzzy Hash: 111110B5C007498FDB10DFAAD844ADEFBF4EB88610F10851AD929B7610D379A545CFA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 376 8259700-825970e 377 8259714-825971a 376->377 378 82599de-8259a03 376->378 379 8259720-8259722 377->379 380 8259808-825980b 377->380 391 8259a0a-8259a12 378->391 382 82598ad-82598b1 379->382 383 8259728-825972b 379->383 384 8259836-8259842 380->384 385 825980d-8259810 380->385 386 82598b3-82598c4 call 82591e0 382->386 387 82598c9-82598d5 382->387 390 8259731-825973d 383->390 383->391 388 8259874-825988f call 82596c8 384->388 389 8259844-8259848 384->389 385->391 392 8259816-8259831 call 82591e0 385->392 413 82599d8-82599dd 386->413 397 8259907-825991a 387->397 398 82598d7-82598db 387->398 388->413 395 8259860-825986b 389->395 396 825984a-825985e 389->396 400 8259763-825976e 390->400 401 825973f-8259743 390->401 405 8259a19-8259a36 391->405 392->413 395->388 396->388 396->395 397->405 410 8259920-8259934 397->410 407 82598f3-82598fe 398->407 408 82598dd-82598f1 398->408 404 8259774-8259783 400->404 400->405 411 8259894-82598a8 401->411 412 8259749-825975d 401->412 404->405 414 8259789-8259798 404->414 428 8259a48-8259a9c 405->428 429 8259a38-8259a47 405->429 407->397 408->397 408->407 410->405 418 825993a-825994e 410->418 411->400 412->400 412->411 414->405 421 825979e-82597ad 414->421 418->405 425 8259954-8259968 418->425 421->405 427 82597b3-82597bc 421->427 425->405 426 825996e-8259982 425->426 426->405 430 8259988-8259991 426->430 427->405 431 82597c2-82597cc 427->431 448 8259aa2-8259aa4 428->448 449 8259b7a-8259b9f 428->449 430->405 432 8259997-82599a1 430->432 431->405 433 82597d2-82597dc 431->433 432->405 436 82599a3-82599ad 432->436 433->405 437 82597e2-82597ec 433->437 436->405 438 82599af-82599b9 436->438 437->405 439 82597f2-8259803 call 82596c8 437->439 438->405 441 82599bb-82599c5 438->441 439->413 441->405 444 82599c7-82599ce 441->444 444->413 446 82599d3 call 82596c8 444->446 446->413 450 8259ba6-8259bcb 448->450 451 8259aaa-8259ab1 448->451 449->450 464 8259bd2-8259bf6 450->464 453 8259ab7 451->453 454 8259b6b-8259b73 451->454 453->454 455 8259b00-8259b03 453->455 456 8259abe-8259ac1 453->456 457 8259b0b-8259b1d call 82591e0 453->457 454->449 459 8259bfd-8259c6a 455->459 460 8259b09 455->460 463 8259ac7-8259ad2 456->463 456->464 471 8259b27-8259b2b 457->471 472 8259b1f-8259b24 457->472 488 8259c70-8259c77 459->488 489 8259ed8-8259efd 459->489 460->463 466 8259ad4-8259ad6 463->466 467 8259ade-8259afd call 82596c8 463->467 464->459 466->467 471->463 477 8259b2d-8259b33 471->477 477->463 479 8259b35-8259b68 477->479 490 8259f04-8259f0d 488->490 491 8259c7d-8259c88 488->491 489->490 492 8259f14-8259f1d 490->492 491->492 493 8259c8e-8259c9a 491->493 503 8259f24-8259f48 492->503 495 8259cad-8259cb7 493->495 496 8259c9c-8259ca5 493->496 498 8259cdf-8259ce3 495->498 499 8259cb9-8259cdc call 82591e0 495->499 496->495 498->503 504 8259ce9 498->504 518 8259f4f-8259f80 503->518 506 8259cf0-8259d0a 504->506 507 8259d0f-8259d30 504->507 508 8259da8-8259db8 504->508 516 8259ea8-8259eb7 506->516 517 8259d36-8259d40 507->517 507->518 511 8259dbd-8259dc0 508->511 514 8259dc2-8259dc6 511->514 515 8259dba 511->515 520 8259de3-8259df5 514->520 521 8259dc8-8259dd1 514->521 515->511 525 8259ece-8259ed5 516->525 526 8259eb9-8259ec3 516->526 517->518 527 8259d46-8259d4d 517->527 533 8259f92-8259fe2 518->533 534 8259f82-8259f86 518->534 523 8259df7-8259dfa 520->523 524 8259e03-8259e2b 520->524 521->518 522 8259dd7-8259dde 521->522 522->516 523->524 536 8259e2e-8259e43 524->536 526->525 531 8259ec5 526->531 527->518 528 8259d53-8259d5c 527->528 528->518 535 8259d62-8259d6b 528->535 531->525 551 8259fe4-8259fee 533->551 552 8259ff1-825a003 533->552 534->533 538 8259f88 534->538 535->518 537 8259d71-8259d7b 535->537 536->518 539 8259e49-8259e50 536->539 537->518 541 8259d81-8259d8b 537->541 544 8259f8e-8259f91 538->544 539->536 542 8259e52-8259e5a 539->542 541->518 543 8259d91-8259d99 541->543 542->518 545 8259e60-8259e7a 542->545 543->518 547 8259d9f-8259da3 543->547 545->518 548 8259e80-8259ea5 545->548 547->516 548->516 551->552
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b25c6d5448e510df9b4a9fc653b7d9c5859d9eaa54e4ec940a0b8da82f71210a
                                                • Instruction ID: aa3957f435c9bdc35babacbfff3c8e238092fcd13449a07e7e35a033548d399d
                                                • Opcode Fuzzy Hash: b25c6d5448e510df9b4a9fc653b7d9c5859d9eaa54e4ec940a0b8da82f71210a
                                                • Instruction Fuzzy Hash: 9D42D130A14606CFCB15CB68D89496EBFF2FF85216B58865DD846DB385DB34EC82CB90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1338 82521b0-8252253 1345 8252336-82523bc 1338->1345 1346 8252259-825226f 1338->1346 1365 82525fd-825260c 1345->1365 1349 82522b5-82522ee call 82519d0 1346->1349 1350 8252271-825227b 1346->1350 1363 82522f0-8252303 1349->1363 1364 825231b-8252331 1349->1364 1350->1345 1352 8252281-8252294 1350->1352 1352->1345 1357 825229a-82522b0 1352->1357 1357->1345 1363->1364 1369 8252305-8252313 1363->1369 1364->1345 1366 8252625 1365->1366 1367 825260e-8252623 1365->1367 1370 8252627-8252629 1366->1370 1367->1370 1369->1364 1371 82523c1-82523d4 1370->1371 1372 825262f-8252654 call 8250dc8 1370->1372 1375 82523d6-82523dc 1371->1375 1376 82523ec-8252411 1371->1376 1381 8252656-8252696 1372->1381 1382 8252698-82526c4 1372->1382 1378 82523e0-82523e2 1375->1378 1379 82523de 1375->1379 1384 8252417-82524bf call 8250a20 call 8250658 1376->1384 1385 82524d0-8252511 call 8250a20 1376->1385 1378->1376 1379->1376 1399 82526cb-8252762 call 8250a20 1381->1399 1382->1399 1447 82524c5 call 8252891 1384->1447 1448 82524c5 call 82528a0 1384->1448 1406 8252513-8252529 1385->1406 1407 8252549-8252575 1385->1407 1437 8252764-8252777 1399->1437 1438 825278f-8252793 1399->1438 1414 82527e4 1406->1414 1415 825252f-8252547 1406->1415 1423 8252577-8252580 1407->1423 1424 82525e2-82525f8 1407->1424 1417 82527e9-82527f0 1414->1417 1415->1406 1415->1407 1419 82527f2 1417->1419 1420 82527fe 1417->1420 1419->1420 1426 82527ff 1420->1426 1423->1414 1425 8252586-82525e0 1423->1425 1424->1365 1425->1423 1425->1424 1426->1426 1427 82524cb 1427->1424 1437->1438 1442 8252779-8252787 1437->1442 1439 8252795-82527a8 1438->1439 1440 82527cf-82527e2 1438->1440 1439->1440 1444 82527aa-82527c7 1439->1444 1440->1417 1442->1438 1444->1440 1447->1427 1448->1427
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 87f5f089047efd5c6cfc906ad6ca3531ceb01fb50d7b5390ade95b40b78d38b2
                                                • Instruction ID: 8842b8f508b801d14e719d67f6a47ef9f052b9f3abf01a52f8b4fcdaf10420ef
                                                • Opcode Fuzzy Hash: 87f5f089047efd5c6cfc906ad6ca3531ceb01fb50d7b5390ade95b40b78d38b2
                                                • Instruction Fuzzy Hash: 63120734A10219CFDB54EF68C894B9DB7B2FF89301F5185A8D90AAB395DB30ED85CB50

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1449 825bf90-825bf97 1450 825bf9f-825bfa1 1449->1450 1451 825bfb1-825bfb6 1450->1451 1452 825bfa3-825bfa6 1450->1452 1453 825bfb7-825c00c 1452->1453 1454 825bfa8-825bfb0 1452->1454 1460 825c0c0-825c0c2 1453->1460 1461 825c012-825c015 1453->1461 1466 825c0c7 1460->1466 1462 825c0ce-825c0d8 1461->1462 1463 825c01b-825c01e 1461->1463 1472 825c0de 1462->1472 1473 825c0da-825c0dd 1462->1473 1464 825c024-825c028 1463->1464 1465 825c0e3-825c111 1463->1465 1468 825c038-825c05d 1464->1468 1469 825c02a-825c033 call 825b578 1464->1469 1475 825c118-825c12d 1465->1475 1470 825c061-825c074 1466->1470 1471 825c0c9-825c0cd 1466->1471 1468->1470 1468->1475 1469->1468 1470->1475 1477 825c07a-825c092 1470->1477 1472->1465 1475->1466 1482 825c12f-825c141 1475->1482 1477->1475 1478 825c098-825c0b0 1477->1478 1478->1475 1481 825c0b2-825c0bf 1478->1481 1483 825c147-825c152 call 825b2b0 1482->1483 1488 825c154-825c176 1483->1488 1489 825c177-825c1ad 1483->1489 1489->1483 1494 825c1af-825c1cb 1489->1494 1495 825c1d1-825c1d7 1494->1495 1496 825c26b-825c290 1494->1496 1497 825c211-825c21f 1495->1497 1498 825c1d9-825c1dd 1495->1498 1505 825c297-825c2c5 1496->1505 1502 825c221 1497->1502 1503 825c22f-825c237 1497->1503 1500 825c1ef-825c1f7 1498->1500 1501 825c1df 1498->1501 1506 825c1fd-825c20e 1500->1506 1507 825c2cc-825c2fa 1500->1507 1504 825c1e5-825c1e9 1501->1504 1501->1505 1508 825c227-825c229 1502->1508 1509 825c301-825c398 1502->1509 1510 825c23d-825c243 1503->1510 1511 825c239-825c23b 1503->1511 1504->1500 1504->1505 1505->1507 1507->1509 1508->1503 1508->1509 1514 825c39f-825c3ff 1509->1514 1510->1514 1515 825c249-825c24c 1510->1515 1511->1510 1513 825c252-825c268 1511->1513 1515->1513 1515->1514
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: be1cd8c646f6a83811670a9a0329674ac37cacec56df081ae54865f746767cdf
                                                • Instruction ID: ef068c9d8db4a870b1b12bfe6acec4505fdd61bd8f5ea6796cba76193de5fde1
                                                • Opcode Fuzzy Hash: be1cd8c646f6a83811670a9a0329674ac37cacec56df081ae54865f746767cdf
                                                • Instruction Fuzzy Hash: 9CD1CE31B147058FCB149B68C55016EBBF7FFC52217288A6ED45ACBB81EE35E846CB90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1538 82528a0-82528b0 1539 82528b6-82528ba 1538->1539 1540 82529c9-82529ee 1538->1540 1541 82529f5-8252a1a 1539->1541 1542 82528c0-82528c9 1539->1542 1540->1541 1543 8252a21-8252a57 1541->1543 1542->1543 1544 82528cf-82528f6 1542->1544 1560 8252a5e-8252abd 1543->1560 1555 82528fc-82528fe 1544->1555 1556 82529be-82529c8 1544->1556 1558 8252900-8252903 1555->1558 1559 825291f-8252921 1555->1559 1558->1560 1561 8252909-8252913 1558->1561 1562 8252924-8252928 1559->1562 1578 8252ae1-8252af8 1560->1578 1579 8252abf-8252ac4 1560->1579 1561->1560 1564 8252919-825291d 1561->1564 1565 8252989-8252995 1562->1565 1566 825292a-8252939 1562->1566 1564->1559 1564->1562 1565->1560 1568 825299b-82529b8 1565->1568 1566->1560 1572 825293f-8252986 1566->1572 1568->1555 1568->1556 1572->1565 1586 8252afe-8252be3 call 82519d0 call 8250dc8 1578->1586 1587 8252be8-8252bf8 1578->1587 1642 8252ac7 call 8252d78 1579->1642 1643 8252ac7 call 8252d88 1579->1643 1581 8252acd-8252ad3 1637 8252ad6 call 8252e29 1581->1637 1638 8252ad6 call 8252e38 1581->1638 1639 8252ad6 call 8252fc8 1581->1639 1640 8252ad6 call 82530a8 1581->1640 1641 8252ad6 call 8253098 1581->1641 1585 8252adc 1588 8252d0a-8252d15 1585->1588 1586->1587 1593 8252ce5-8252d01 1587->1593 1594 8252bfe-8252cd7 call 82519d0 1587->1594 1595 8252d44-8252d65 1588->1595 1596 8252d17-8252d27 1588->1596 1593->1588 1634 8252ce2 1594->1634 1635 8252cd9 1594->1635 1603 8252d37-8252d3d 1596->1603 1604 8252d29-8252d2f 1596->1604 1603->1595 1604->1603 1634->1593 1635->1634 1637->1585 1638->1585 1639->1585 1640->1585 1641->1585 1642->1581 1643->1581
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 80028938e786cf3e14033b84b9ec7e9d491b048951dedbd1c5759683ee01fc5f
                                                • Instruction ID: ebf43e669f1552e9571d37631719d91d43d843655c256f294946782a5e50d89e
                                                • Opcode Fuzzy Hash: 80028938e786cf3e14033b84b9ec7e9d491b048951dedbd1c5759683ee01fc5f
                                                • Instruction Fuzzy Hash: 82E17834A01209DFDB54DFA4D89499D7BB2FF89311F148559E906AB3A4DF30ED42CBA0
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fe91243b53d9e00722a6c80fb3533ef8a6b3cc2338cde9ef70b621531fc14f22
                                                • Instruction ID: 1c9d06bd5886e158521d333846b4ce1cd72256b7551c98ac4588e73f87cb4bc6
                                                • Opcode Fuzzy Hash: fe91243b53d9e00722a6c80fb3533ef8a6b3cc2338cde9ef70b621531fc14f22
                                                • Instruction Fuzzy Hash: EEC1B531A64741CFDB29CF68C454A29BBF2BF85322F19855DE8868B791CB30EC46CB51
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1ed9ec7aa3584167275d7d39ec364ce04235b359012161204de890286d6a88eb
                                                • Instruction ID: 1f39647ff91b0d380a5e2fd13bad643f75f179464f1c624e39aba98463bc060c
                                                • Opcode Fuzzy Hash: 1ed9ec7aa3584167275d7d39ec364ce04235b359012161204de890286d6a88eb
                                                • Instruction Fuzzy Hash: 9ED1DD34B11218AFDB44EFA5D994EAEB7B3FF89700F144458E906AB3A5CB71AC01CB50
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8c6d73996ebe55a4fda760c730d85e69bb166c1a998781cfef5942d332322ad4
                                                • Instruction ID: 47bdb6819eb72badfeb78de0eb373ea36300c7e6db907d4cfce143a956c58230
                                                • Opcode Fuzzy Hash: 8c6d73996ebe55a4fda760c730d85e69bb166c1a998781cfef5942d332322ad4
                                                • Instruction Fuzzy Hash: B0B19E347106058FCB44EF68C8A0AAE77B2EFC9701F504A58E5169B3A4DF31ED46CB91
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 915ee5243fe71b2888261ef43a007b992766845a3c1afe55b9b0708181451b48
                                                • Instruction ID: 90e8cf83aca7a4580c9c73122a6c778e17024aa2d5660c3678ab70db972d3c9c
                                                • Opcode Fuzzy Hash: 915ee5243fe71b2888261ef43a007b992766845a3c1afe55b9b0708181451b48
                                                • Instruction Fuzzy Hash: 52C1C974B50218CFDB44EFA8C994AADB7B6FF89301F104568E506AB3A5DB71EC42CB50
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a9fd0080a9be6bdc7eb0953afce92f2c47c852a988614104a86ab46448c2d245
                                                • Instruction ID: 296eff4a2c7a35981e8d619f899563bf8b049142511422ec6871d21ba71d8abd
                                                • Opcode Fuzzy Hash: a9fd0080a9be6bdc7eb0953afce92f2c47c852a988614104a86ab46448c2d245
                                                • Instruction Fuzzy Hash: FFA1A335304201DFD7159F68D894A2A7BB3EFC9311B1585ADE6068F7A2CB36EC42CB91
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b585071fc7f0497a4816ae83146bacf6c0ba6dcdcecd4d8a959d7bbf303422bb
                                                • Instruction ID: 2a73bb93db1306e2f01f1bfb233509c538415f803ad8db8f667799ae3c447a7e
                                                • Opcode Fuzzy Hash: b585071fc7f0497a4816ae83146bacf6c0ba6dcdcecd4d8a959d7bbf303422bb
                                                • Instruction Fuzzy Hash: 7BC1EB74B50218DFDB44EFA4C994AAEB7B6FF89301F104568E506AB3A5DB71EC02CB50
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8346ff17a52ade7f1eb8c51227cfb071fb6b2fac4f494b5ed57f642bad7443c7
                                                • Instruction ID: 49b520f012acbe416b83523d0751cf7c04de52374ed6e9e2c290e18561f8a95a
                                                • Opcode Fuzzy Hash: 8346ff17a52ade7f1eb8c51227cfb071fb6b2fac4f494b5ed57f642bad7443c7
                                                • Instruction Fuzzy Hash: E7B1ED34B11218DFDB44DFA9D994E9EB7B6FF89700F148458E902AB3A5CB71AC41CB90
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 73b65269e86787451da2647d0b65ce0699769ea91b36560035c3f17e91bfe046
                                                • Instruction ID: 14aacc8cda56e0cf9dee466681db88caa4438afef2a7d4d9f1a3c6e774092dd1
                                                • Opcode Fuzzy Hash: 73b65269e86787451da2647d0b65ce0699769ea91b36560035c3f17e91bfe046
                                                • Instruction Fuzzy Hash: F6A17B347106048FCB48EF68C8A4A6E77B2EFC9701F504A68E5169B3A4DF30ED46CB91
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cffca85c4935615a2d2edba47cede2688c3578713495534513c76d608cd942e5
                                                • Instruction ID: 0ae36ad4234b0e7392fd93401518796154e7f88a699ea424c2deb13342ec7fdc
                                                • Opcode Fuzzy Hash: cffca85c4935615a2d2edba47cede2688c3578713495534513c76d608cd942e5
                                                • Instruction Fuzzy Hash: 18915B34750215DFDB54DF68D898A6DBBB6EF89611F1480ADE906DB3A1CB30EC41CBA0
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: af1d92887ae341f36cd7145fe9a8b9b50e412f488d37ef087fb9173946ca8ebb
                                                • Instruction ID: 22ebbef7e84e54a088605efba3d00bd52b93109ed28cd5a58756552e55b0aab0
                                                • Opcode Fuzzy Hash: af1d92887ae341f36cd7145fe9a8b9b50e412f488d37ef087fb9173946ca8ebb
                                                • Instruction Fuzzy Hash: FC817E34B506059FDB48EF64D964BAEB7B2EF88701F204528D902AB394CF75AD42CB90
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 56b21868ce9f16aff7fea8706052655b5839307edd9c0373fa13689b143440b7
                                                • Instruction ID: 1c5c3dc836eeb0f3ce4cd24abc849fe4e0d46378414cdbc0bd77a67dc935d7f7
                                                • Opcode Fuzzy Hash: 56b21868ce9f16aff7fea8706052655b5839307edd9c0373fa13689b143440b7
                                                • Instruction Fuzzy Hash: DD810434A21229EFDB14CF98D891EADB7B2FF88310F154259E906AB361D771EC41CB40
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4dfd3b23f04b50770d30c86ec28beb9e8b930a306ca2470c7ff1dae476e2799a
                                                • Instruction ID: 78d192508e705f04c58172e0bd0ff28b041adfd3b14431d1562b0c9766df761e
                                                • Opcode Fuzzy Hash: 4dfd3b23f04b50770d30c86ec28beb9e8b930a306ca2470c7ff1dae476e2799a
                                                • Instruction Fuzzy Hash: 3561E274B116059FDB09EF74D964BAE7BB3AF89301F244129E8029B391CF74AD42CB91
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 34603c2687c8af70d19cd6b2dea440ff50e3a6dc1a25ffc1ed3274cc0211df7a
                                                • Instruction ID: 655589d6e53533ffefb1baff74874e7694837ef5fb1648a98beb55284dfde851
                                                • Opcode Fuzzy Hash: 34603c2687c8af70d19cd6b2dea440ff50e3a6dc1a25ffc1ed3274cc0211df7a
                                                • Instruction Fuzzy Hash: B551F031300B159FE724DF2AC850B5BBBE6EF84321F14862DE9568B390DB75E901CBA0
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ce740aade90883ff5447b608ea45d3153d4245e40cdde00972605f7f72e16ea1
                                                • Instruction ID: 2c6e08596120952b6c43e6e9db0ac0b7f65cd26fd4e0816a3403048ce57a3304
                                                • Opcode Fuzzy Hash: ce740aade90883ff5447b608ea45d3153d4245e40cdde00972605f7f72e16ea1
                                                • Instruction Fuzzy Hash: 3451A130B106058FC704EF68C954A6EB7F6EF89301B10856AE506DB3A1DF31ED05CBA1
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7e35a01f81e3bb72ef77f156f228a556fc61957ef7b90208c29700feafe9a3ea
                                                • Instruction ID: b24fae4aee9866bf12a647dc57d2c3cfbd555ff15f4af411827e8588bfba0b09
                                                • Opcode Fuzzy Hash: 7e35a01f81e3bb72ef77f156f228a556fc61957ef7b90208c29700feafe9a3ea
                                                • Instruction Fuzzy Hash: 80615B34B10605DFCB54DF68C898A6DB7B6FF89711F148169E9169B3A1CB30EC41CBA0
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 06c4d1804ca287e5d3de580021c38671b813cdff4185ce982cd855e03d96c5c7
                                                • Instruction ID: beb7f4d71bed59add1e9fe82af3c2f0f8281aa5a6bf22f1b03a473cdbd6e5464
                                                • Opcode Fuzzy Hash: 06c4d1804ca287e5d3de580021c38671b813cdff4185ce982cd855e03d96c5c7
                                                • Instruction Fuzzy Hash: CA416E30B106148FDB54ABA8C894A6EB7BBEFC9701F10441EE512AB394DF749D06CBA1
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3019e6f342127eb51a8036f44ce8d533469bdc3eff8ea99d9be2c7d55c47331f
                                                • Instruction ID: e3512b2ea1f91c056689e4b7df67d55f4b6638fa8b03bfe758d705fc8c7d528e
                                                • Opcode Fuzzy Hash: 3019e6f342127eb51a8036f44ce8d533469bdc3eff8ea99d9be2c7d55c47331f
                                                • Instruction Fuzzy Hash: 1241A331B002159FD705DF69D844A9EBBF6FFC9320B2582AAD50ADB361DB71AC01CB90
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 37a833a9757078acdcbab37e419d1b5aa823163eab36fb298ed11889095ca3d2
                                                • Instruction ID: eaaa559e5c7a56df99be4f0573b55ef6cbf8dbebe4aacabd8e516fc2d48152a5
                                                • Opcode Fuzzy Hash: 37a833a9757078acdcbab37e419d1b5aa823163eab36fb298ed11889095ca3d2
                                                • Instruction Fuzzy Hash: 30419E31B10B158FCB60DB78D5442AFB7F2EF84621B14896ED55AC7A90DB34F941CB81
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b1b18a3b7450f03a23b553c6520f4a68386f089f203074562ab39729891b478e
                                                • Instruction ID: 107b4ba5b311b688021669283c7c34f5e8e8b5589128103b86197a23de665077
                                                • Opcode Fuzzy Hash: b1b18a3b7450f03a23b553c6520f4a68386f089f203074562ab39729891b478e
                                                • Instruction Fuzzy Hash: 71415C357406009FD318EB29C864F2B77EAAFC9711F104568E6068B3A1CF75EC02C7A0
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dc56ea17e27a484a75e876b19d8fa430010117ff297e6f3ec6969e6a78028300
                                                • Instruction ID: 78fb316a2e79ce965be763207a4a2fae7eafdf92412b835512870cc12c6b1d59
                                                • Opcode Fuzzy Hash: dc56ea17e27a484a75e876b19d8fa430010117ff297e6f3ec6969e6a78028300
                                                • Instruction Fuzzy Hash: 0F3159357406019FD758EB69C8A8F2B77EAAFC9711F104568E60A8B3A5CF75EC02C790
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6e6e4449b98b14f598fe6b9f5b323bbe20d895d92ac828d436555a0f1cb385f5
                                                • Instruction ID: dc69a9159575cf31ca5c08c1e24a8844ad20945b4716b3ec8070130d49621fa4
                                                • Opcode Fuzzy Hash: 6e6e4449b98b14f598fe6b9f5b323bbe20d895d92ac828d436555a0f1cb385f5
                                                • Instruction Fuzzy Hash: CE31C034B106048FCB44EB28C854AAE7BB6EF89300B10855AD502DB3A1DB309906CBA1
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f091f605090646b2fdd632470f7914bbdb7977bba807aa7e8d06e6f493823b90
                                                • Instruction ID: 5f53ae860c1e9c4b865f231aa429228c40501f5e72dfd8f3262c754a4a50d00f
                                                • Opcode Fuzzy Hash: f091f605090646b2fdd632470f7914bbdb7977bba807aa7e8d06e6f493823b90
                                                • Instruction Fuzzy Hash: AA319E30B102149BDB54ABA88C6877EBBEBEF89611F14442EE506EB7C5CF745C06C761
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c6657417c808b5bc1094959c40661f6a16308c1646a3111013b782e9269e9c89
                                                • Instruction ID: b67e6fd5760dcc4266bbc89ac397a5138a538ac68968d125490a7ee52f319ad3
                                                • Opcode Fuzzy Hash: c6657417c808b5bc1094959c40661f6a16308c1646a3111013b782e9269e9c89
                                                • Instruction Fuzzy Hash: 86313835A501199BDB14DFA4DC54AEEB7B6EF8C351F109029E902B7394CB31AD15CBA0
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 01fefa81eda16d32828c975532ea3c6a42307846b57d1550e39d85034e38a000
                                                • Instruction ID: 5cb7060888353cf4a9e26b4d69f8688ba64645131b597a52bf6f669887bc765b
                                                • Opcode Fuzzy Hash: 01fefa81eda16d32828c975532ea3c6a42307846b57d1550e39d85034e38a000
                                                • Instruction Fuzzy Hash: 1D318134B105098FCB44EF68C894A6E77B6EFC9701F10851AD9029B3A4DF709D02CBE1
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 58316a3693739b246b7fe653b8b6465522884178a888a42a2adae8ed986ecbf5
                                                • Instruction ID: 7ae8fe8fd41fdb2d385785bd78e5bdf48ce1cade21f6889978b745d6768a07a6
                                                • Opcode Fuzzy Hash: 58316a3693739b246b7fe653b8b6465522884178a888a42a2adae8ed986ecbf5
                                                • Instruction Fuzzy Hash: 38219C31A04219DFCB149FA8C864AEE7FB7FF8D321F144229E911A7390DB319841CBA0
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4788650005.000000000162D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0162D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_162d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8910bad8960d69959e98d613763a351e43883459815e3bc7389f558c6d1c2d73
                                                • Instruction ID: fbe28dea76b89ccf13520ce3bfd60946ccf891a1ab518b5852601935fec0e260
                                                • Opcode Fuzzy Hash: 8910bad8960d69959e98d613763a351e43883459815e3bc7389f558c6d1c2d73
                                                • Instruction Fuzzy Hash: B6213471604644DFDB15DF98D9C0B16BB61FB88314F24C5ADE90A0B3A2C33AD447CE61
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1bd61b7efb7d24727d7f8de7f686262b3684b8f1cdaec7f5927e3b8866894edf
                                                • Instruction ID: c624f1f3df8f56cb83108f29e6beda3005b40c427e106f6d4a65da8159f53b55
                                                • Opcode Fuzzy Hash: 1bd61b7efb7d24727d7f8de7f686262b3684b8f1cdaec7f5927e3b8866894edf
                                                • Instruction Fuzzy Hash: 5521AE346002058FC714EF78D884AAEBBB6FF89300B144969E506973A1DB70ED05CBB1
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9f5fbb8b3a6dc1e293a49c01104e4c466e468a13ef157e77e288223d53934640
                                                • Instruction ID: 7f8b9183868806d14d2366e9f99e78a936aea68839ed81d61de0c5f1602a9cac
                                                • Opcode Fuzzy Hash: 9f5fbb8b3a6dc1e293a49c01104e4c466e468a13ef157e77e288223d53934640
                                                • Instruction Fuzzy Hash: 9611E936210505AFCB055F94DD04DAA7F7BEF8A321B054099F6458B171C772C951DBA1
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 82ed3194bdca2dfb26336fdb88351d914920e264a65c2185c96881775bac5e15
                                                • Instruction ID: bc89c77a9c1cb3d45d8c0585338af275f00a6c08764c42bb84bcf0d494fc01bb
                                                • Opcode Fuzzy Hash: 82ed3194bdca2dfb26336fdb88351d914920e264a65c2185c96881775bac5e15
                                                • Instruction Fuzzy Hash: 6321AC31A00219DFCB149FA8C864AEE7FB7FF8D321F145229E915A7390CB319841CBA0
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4788650005.000000000162D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0162D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_162d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5734845e9200645214fd9f6c372f6860a96c1c8c054ca1ca773268dc6753858e
                                                • Instruction ID: 80c0b18e670e0a53a0fd3c04a3009014a6cb79083b93f6e5e5e1b94e7389a48e
                                                • Opcode Fuzzy Hash: 5734845e9200645214fd9f6c372f6860a96c1c8c054ca1ca773268dc6753858e
                                                • Instruction Fuzzy Hash: 3B2192755087849FCB02CF64D994B11BF71EF46314F29C5DAD8498F2A7C33A981ACB62
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2df59758918050d2291462a7db1c001f682bf54068af0abad4d765b29ed37610
                                                • Instruction ID: f07aa3a842fb9d9b5528b333064d70ade05635f0a82dc69c163471785038695f
                                                • Opcode Fuzzy Hash: 2df59758918050d2291462a7db1c001f682bf54068af0abad4d765b29ed37610
                                                • Instruction Fuzzy Hash: 5E11E7726187509FC7218B39E814617BBF2AFC6321B09886FE586CBA91D770A845C721
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 449fcd3a4a52cc455ba16fff0675258a6c4228c692eedd2535bb52f8bdd16b99
                                                • Instruction ID: d8041ce22ecdc84abe464401e800487ae7809c885c5f132eccf74b2f3005139a
                                                • Opcode Fuzzy Hash: 449fcd3a4a52cc455ba16fff0675258a6c4228c692eedd2535bb52f8bdd16b99
                                                • Instruction Fuzzy Hash: 04118B34B106058FCB54EF68D884A6EB7F6FF88300F144969E5069B3A0DB70ED05CBA1
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d0c1532224186254acb537f08f7943f1bffdaf23a987038b7f2a882662c6ef2d
                                                • Instruction ID: 87568e728e3a4cf02a0e989403348b6c2ea75c1194bc900d035988ca2bb09c93
                                                • Opcode Fuzzy Hash: d0c1532224186254acb537f08f7943f1bffdaf23a987038b7f2a882662c6ef2d
                                                • Instruction Fuzzy Hash: 4C0147223186109BD30966294C2477F3BEB9FC6712F69406FE942DB381DE795D0283A5
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b5150a7a118a85c1bb1ca86524892724b0210f0953fccd8e01e5576e68e1ff3c
                                                • Instruction ID: d7b03075941d9985a1d02efd8d5f17027e535349ff63ee40d9ac5297aede9982
                                                • Opcode Fuzzy Hash: b5150a7a118a85c1bb1ca86524892724b0210f0953fccd8e01e5576e68e1ff3c
                                                • Instruction Fuzzy Hash: 210100353107409FC725AA24D854A3BBBA2AFCA321F1446ACE9128B391CB30EC02C790
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 14e33c7a3c3150669c23e8f37cbc33774da6298b5544be501da28f273543d413
                                                • Instruction ID: 5b29ce25bb1d816aee82d355ece676f037206a74e024936d8580978b61fc9063
                                                • Opcode Fuzzy Hash: 14e33c7a3c3150669c23e8f37cbc33774da6298b5544be501da28f273543d413
                                                • Instruction Fuzzy Hash: 4E117C30A21229DFCB14CF58DC95EADBBB2FF48220F054259F516AB3A2CB749C45CB40
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4e91512827a51cd88f05df4a8e83f08811dff8aabf1991e28b9c5379f8656b0b
                                                • Instruction ID: 454b0730e8b8eb83973ba8dabda437df7bc22624ca936d41feb434d6c2f1d104
                                                • Opcode Fuzzy Hash: 4e91512827a51cd88f05df4a8e83f08811dff8aabf1991e28b9c5379f8656b0b
                                                • Instruction Fuzzy Hash: 37018475304A109FC705AF24D86492ABBB7EFC97117104569EA06C7791CF35EC12CBE1
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 218011cc886e250409e260a08f7f69d169a1c73919bc95558b974c00a2f36506
                                                • Instruction ID: e04564a5d0b1b47fbc098bb851bf9ac384b1b05009a841dc8939e9e3470fc39f
                                                • Opcode Fuzzy Hash: 218011cc886e250409e260a08f7f69d169a1c73919bc95558b974c00a2f36506
                                                • Instruction Fuzzy Hash: 4301D4353106009FC724EB24D854A3BB7A2EFC9321F14966CDA164B790CF71EC02CB84
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 617954d9828b33a1f7b89b8e3dfe0a9c74f9177e366a7bf342a790700912298a
                                                • Instruction ID: 174e1007042235139cfffeab4e99648eac421180da9a5f4482f6f9316904e0aa
                                                • Opcode Fuzzy Hash: 617954d9828b33a1f7b89b8e3dfe0a9c74f9177e366a7bf342a790700912298a
                                                • Instruction Fuzzy Hash: CF019E36E10609EFCB01DFA8D50569EBBF5EF98711F10856AD449E3310EB309A04CF51
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1210e966ec980c6365792f142d02ddf17758b67c14a0bb2bdb581dc711c47a18
                                                • Instruction ID: 1438292546257e1c00f261cc9925e1618ba9b3c2e61eaad600994a25cc149189
                                                • Opcode Fuzzy Hash: 1210e966ec980c6365792f142d02ddf17758b67c14a0bb2bdb581dc711c47a18
                                                • Instruction Fuzzy Hash: 5E01F4753053409FC7158B28D844D6A7B7AEFCA610B0540AEF5458B3A1CA31DC02C7B0
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8f06fc809db508dd7da117ca0747932dbd58246abcdfbc65611517f43c10fbde
                                                • Instruction ID: a98c4eaa003cc291515d63a1057229fe8e0ade17d3caf537a2a62ee530c0314c
                                                • Opcode Fuzzy Hash: 8f06fc809db508dd7da117ca0747932dbd58246abcdfbc65611517f43c10fbde
                                                • Instruction Fuzzy Hash: 3F0181393005109FC708AB29D56492EB7B7EFCD711B108529EA0687794CF31EC12CBD0
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4787122459.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_161d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c0b3ca039c318c3ebac61ce467a7aa36399e9235be37957b353ffde460e3d2ee
                                                • Instruction ID: 9f42c6da99a5732decf8e30f2b323ec35a742d13a8e4fe1a71f652e97ba3b1e3
                                                • Opcode Fuzzy Hash: c0b3ca039c318c3ebac61ce467a7aa36399e9235be37957b353ffde460e3d2ee
                                                • Instruction Fuzzy Hash: 3CF04976200604AF97208F0ACC84C27FBADEFC4634719C55AEC4A4B716C331EC02CAA0
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4787122459.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_161d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a74ff8e2837fb9a63de5d6ddd93066f3ba256c361822b066b66886699ee01bb1
                                                • Instruction ID: bd95c052a28a0f2a6059c5b0472d6ef7acff1f88b7b715642c7f85d7df966e65
                                                • Opcode Fuzzy Hash: a74ff8e2837fb9a63de5d6ddd93066f3ba256c361822b066b66886699ee01bb1
                                                • Instruction Fuzzy Hash: 11F03C75104640AFD715CF55CC94C23BFB9EF856607198589E84A4B362C731FC42CBA0
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 26908d3c2775b089f7b8586a5cf9beb82145123596010df1a1eb086a5e1a923c
                                                • Instruction ID: 852a1e1298874abfa365552da593fb12aad802f3dda4efe67d7d8dc4c5de1b1d
                                                • Opcode Fuzzy Hash: 26908d3c2775b089f7b8586a5cf9beb82145123596010df1a1eb086a5e1a923c
                                                • Instruction Fuzzy Hash: 44F05E353002009FC704DB19D854E2A77AAEFC9721B11846DFA068B760CE31EC42CBA0
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1247c20d44b94429a1d49c251ed0caa719614e823668247bcc531dd46a0a8d9c
                                                • Instruction ID: 554a5af3ee5ae3170ec3bf01da1b9d0f5c47af2493ba10831044be8301ea98c1
                                                • Opcode Fuzzy Hash: 1247c20d44b94429a1d49c251ed0caa719614e823668247bcc531dd46a0a8d9c
                                                • Instruction Fuzzy Hash: 2BF0E53940B3C46FD72357309C28441BF30DB17504709059BD49286293C636946AD76A
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2ec05ef2b0073738cf7e4212493059492f81e848e31460fefacc3d3e6e33dafa
                                                • Instruction ID: 594ff52292b287fe0b16969403fdc403bb9f2a8b7a15da1d25bfd7b843a0300c
                                                • Opcode Fuzzy Hash: 2ec05ef2b0073738cf7e4212493059492f81e848e31460fefacc3d3e6e33dafa
                                                • Instruction Fuzzy Hash: 31F0A0317401049FDB04CB19D941A59BBE1FF88324F198199E50AAB361C671FC028BA0
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 18b6b68b1da33df1b23e0b21618e634e60dd7ee6832cd858ecc802c6a6ef0176
                                                • Instruction ID: c13ec96116a3527ff80c2cb950b061c268125c223690a0f07abce7715e42e57c
                                                • Opcode Fuzzy Hash: 18b6b68b1da33df1b23e0b21618e634e60dd7ee6832cd858ecc802c6a6ef0176
                                                • Instruction Fuzzy Hash: 68E08C612093A45BD305A3B9A8105AB7FAF8BCA110B0440ABE50583752CE656C0163BA
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 93070b236e0a77f9fb9f5e2fc407c887972644d339849f443971ec15d0178e45
                                                • Instruction ID: e8997098115f58f6d582e54f970cea2695274c8a36d7b34cd39a4d0a952c9741
                                                • Opcode Fuzzy Hash: 93070b236e0a77f9fb9f5e2fc407c887972644d339849f443971ec15d0178e45
                                                • Instruction Fuzzy Hash: 8CD02B312597515FEB2106205505220BFA8EB02532B28044FF0C5DB181DA158C808796
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0f9a4ce1779d95746e006b65ce6ac131ab8eead4502f97d1ce0b36e87955e08e
                                                • Instruction ID: 08168bcf18d9170efcdee4f0a538a60fe485eed2bf4223e89d90c60df9e017e5
                                                • Opcode Fuzzy Hash: 0f9a4ce1779d95746e006b65ce6ac131ab8eead4502f97d1ce0b36e87955e08e
                                                • Instruction Fuzzy Hash: 64D09E7510A685AFD3269F20CA58801FFB6AF4A654728CC8EE4C6CB153C7369887DB61
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0f1ece48fbbaaf26a393302f938fdec459920cc1f0eaf5fbbe34678afdff377c
                                                • Instruction ID: 9c30c95fb1279c08895ebc32ac6bb8d7fbb49f391265fffb3bcc957f401f5ca8
                                                • Opcode Fuzzy Hash: 0f1ece48fbbaaf26a393302f938fdec459920cc1f0eaf5fbbe34678afdff377c
                                                • Instruction Fuzzy Hash: 46D0137531411447D74467BED41456F76DFDFC91507048026D60AC3744CE756C0157E9
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7c913d960f35180c8564be2327606ad88fd47740519a04567f2d72fced336d4f
                                                • Instruction ID: 96ff60b1f22ff6dc4091cfb83caff27cc6bdd20b1c35c26d43c57a91421082c8
                                                • Opcode Fuzzy Hash: 7c913d960f35180c8564be2327606ad88fd47740519a04567f2d72fced336d4f
                                                • Instruction Fuzzy Hash: B3D05E7110D281EFC7014F24D4058907FB0EF153513154486E488CF132C239984ECB11
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3fc42a07273c1d599eba9c07982cf1c5c1cf64ab2373cce6048c920fa0d0c2aa
                                                • Instruction ID: b5a82123aed1b56f2b18d06f0264012d8108cd63f004bd2cf861d2c5f3eca7dc
                                                • Opcode Fuzzy Hash: 3fc42a07273c1d599eba9c07982cf1c5c1cf64ab2373cce6048c920fa0d0c2aa
                                                • Instruction Fuzzy Hash: 9FD05E3110B3409FE7024F2095194157F7AEF96300B168C9ED48987621C3344C59CB20
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3ba81f8d25ccc336c8394fdd56acaeca47ce09bc86fde057b97738f0aac3c20e
                                                • Instruction ID: d996631717a113d47f36f18ec491c6d7b8b2983b210b8b4aab55505388a3605e
                                                • Opcode Fuzzy Hash: 3ba81f8d25ccc336c8394fdd56acaeca47ce09bc86fde057b97738f0aac3c20e
                                                • Instruction Fuzzy Hash: 76D0C93A20A640AFC3069B10C864885BB76AF96204718C49EB489CB293C737DD17EB25
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                                • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.4833736573.0000000008250000.00000040.00000800.00020000.00000000.sdmp, Offset: 08250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_8250000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d70b84d66bd2fb0d0f39b8b224d345af8f2ac333f75a9c127143a39121d5d93c
                                                • Instruction ID: 96f36876d1bc9b72036b9def387595632849d67905268825b85ed6f799b31a6c
                                                • Opcode Fuzzy Hash: d70b84d66bd2fb0d0f39b8b224d345af8f2ac333f75a9c127143a39121d5d93c
                                                • Instruction Fuzzy Hash: 28B0923200420CABC7009A84ED04855BB69AB58600700C025B609065118B72A822DB94

                                                Execution Graph

                                                Execution Coverage:6.3%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:81
                                                Total number of Limit Nodes:10
                                                execution_graph 15195 17b4668 15196 17b4676 15195->15196 15201 17b6de0 15196->15201 15199 17b4704 15202 17b6e05 15201->15202 15210 17b6edf 15202->15210 15214 17b6ef0 15202->15214 15203 17b46e9 15206 17b421c 15203->15206 15207 17b4227 15206->15207 15222 17b8560 15207->15222 15209 17b8806 15209->15199 15212 17b6f17 15210->15212 15211 17b6ff4 15211->15211 15212->15211 15218 17b6414 15212->15218 15216 17b6f17 15214->15216 15215 17b6ff4 15215->15215 15216->15215 15217 17b6414 CreateActCtxA 15216->15217 15217->15215 15219 17b7370 CreateActCtxA 15218->15219 15221 17b7433 15219->15221 15223 17b856b 15222->15223 15226 17b8580 15223->15226 15225 17b88dd 15225->15209 15227 17b858b 15226->15227 15230 17b85b0 15227->15230 15229 17b89ba 15229->15225 15231 17b85bb 15230->15231 15234 17b85e0 15231->15234 15233 17b8aad 15233->15229 15235 17b85eb 15234->15235 15237 17b9e93 15235->15237 15240 17bbed1 15235->15240 15236 17b9ed1 15236->15233 15237->15236 15246 17bdf70 15237->15246 15241 17bbeda 15240->15241 15243 17bbe91 15240->15243 15250 17bbf08 15241->15250 15253 17bbef8 15241->15253 15242 17bbee6 15242->15237 15243->15237 15247 17bdf91 15246->15247 15248 17bdfb5 15247->15248 15261 17be120 15247->15261 15248->15236 15256 17bbff0 15250->15256 15251 17bbf17 15251->15242 15254 17bbf17 15253->15254 15255 17bbff0 GetModuleHandleW 15253->15255 15254->15242 15255->15254 15257 17bc034 15256->15257 15258 17bc011 15256->15258 15257->15251 15258->15257 15259 17bc238 GetModuleHandleW 15258->15259 15260 17bc265 15259->15260 15260->15251 15262 17be12d 15261->15262 15263 17be166 15262->15263 15265 17bc464 15262->15265 15263->15248 15266 17bc46f 15265->15266 15268 17be1d8 15266->15268 15269 17bc498 15266->15269 15270 17bc4a3 15269->15270 15271 17b85e0 3 API calls 15270->15271 15272 17be247 15271->15272 15275 17be2c0 15272->15275 15273 17be256 15273->15268 15276 17be2ee 15275->15276 15277 17bc530 GetFocus 15276->15277 15278 17be317 15276->15278 15280 17be3bf 15276->15280 15277->15278 15279 17be3ba KiUserCallbackDispatcher 15278->15279 15278->15280 15279->15280 15281 17b6540 15282 17b6586 GetCurrentProcess 15281->15282 15284 17b65d8 GetCurrentThread 15282->15284 15285 17b65d1 15282->15285 15286 17b660e 15284->15286 15287 17b6615 GetCurrentProcess 15284->15287 15285->15284 15286->15287 15288 17b664b 15287->15288 15293 17b670f 15288->15293 15295 17b6780 15288->15295 15289 17b6673 GetCurrentThreadId 15290 17b66a4 15289->15290 15294 17b66af 15293->15294 15294->15289 15296 17b6783 DuplicateHandle 15295->15296 15299 17b671f 15295->15299 15298 17b681e 15296->15298 15298->15289 15299->15289

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 017B65BE
                                                • GetCurrentThread.KERNEL32 ref: 017B65FB
                                                • GetCurrentProcess.KERNEL32 ref: 017B6638
                                                • GetCurrentThreadId.KERNEL32 ref: 017B6691
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2459401769.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_17b0000_workbook.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: ccf424a3aeb6b64fd3c2049508bbf9d5f0d20db61e7c01ce6137c17ffae4fd74
                                                • Instruction ID: a0836d2b5400bb50fb55b61906be95e7aa8caae001ae887c9ee1851230151da5
                                                • Opcode Fuzzy Hash: ccf424a3aeb6b64fd3c2049508bbf9d5f0d20db61e7c01ce6137c17ffae4fd74
                                                • Instruction Fuzzy Hash: 4E5176B0900309CFEB44DFA9D588BDEFBF1EF48314F248059E209A72A1DB359945CB65

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 017B65BE
                                                • GetCurrentThread.KERNEL32 ref: 017B65FB
                                                • GetCurrentProcess.KERNEL32 ref: 017B6638
                                                • GetCurrentThreadId.KERNEL32 ref: 017B6691
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2459401769.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_17b0000_workbook.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: dd57037436e2e83ccbb8c399aa299781afdd9bccedfe517c93f0c349878014ec
                                                • Instruction ID: 3e432b808d92d79e15e82b1860c49db5b5c6d7e83abfc8189905e154c0be4a72
                                                • Opcode Fuzzy Hash: dd57037436e2e83ccbb8c399aa299781afdd9bccedfe517c93f0c349878014ec
                                                • Instruction Fuzzy Hash: F35165B0900309DFDB44DFA9D588BDEFBF1EF88314F248059E509A7290DB35A944CB65

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 50 17bbff0-17bc00f 51 17bc03b-17bc03f 50->51 52 17bc011-17bc01e call 17baf60 50->52 54 17bc053-17bc094 51->54 55 17bc041-17bc04b 51->55 57 17bc020 52->57 58 17bc034 52->58 61 17bc0a1-17bc0af 54->61 62 17bc096-17bc09e 54->62 55->54 105 17bc026 call 17bc698 57->105 106 17bc026 call 17bc660 57->106 58->51 63 17bc0d3-17bc0d5 61->63 64 17bc0b1-17bc0b6 61->64 62->61 69 17bc0d8-17bc0df 63->69 66 17bc0b8-17bc0bf call 17baf6c 64->66 67 17bc0c1 64->67 65 17bc02c-17bc02e 65->58 68 17bc170-17bc230 65->68 71 17bc0c3-17bc0d1 66->71 67->71 100 17bc238-17bc263 GetModuleHandleW 68->100 101 17bc232-17bc235 68->101 72 17bc0ec-17bc0f3 69->72 73 17bc0e1-17bc0e9 69->73 71->69 75 17bc100-17bc109 call 17baf7c 72->75 76 17bc0f5-17bc0fd 72->76 73->72 81 17bc10b-17bc113 75->81 82 17bc116-17bc11b 75->82 76->75 81->82 83 17bc139-17bc146 82->83 84 17bc11d-17bc124 82->84 91 17bc169-17bc16f 83->91 92 17bc148-17bc166 83->92 84->83 86 17bc126-17bc136 call 17baf8c call 17baf9c 84->86 86->83 92->91 102 17bc26c-17bc280 100->102 103 17bc265-17bc26b 100->103 101->100 103->102 105->65 106->65
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 017BC256
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2459401769.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_17b0000_workbook.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 29aa87d706e0feecf5bd661ed87604d8ea32aa77cf53132eded9440874326305
                                                • Instruction ID: a4b09e36b9a2a3febc88769acdd9114683dd93b3c56ec4c1ffd8e532cf7f3a88
                                                • Opcode Fuzzy Hash: 29aa87d706e0feecf5bd661ed87604d8ea32aa77cf53132eded9440874326305
                                                • Instruction Fuzzy Hash: 828124B0A00B058FE725DF69D48479ABBF1BF88314F108A2DD58ADBA50D775E846CB90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 107 17b6414-17b7431 CreateActCtxA 110 17b743a-17b7494 107->110 111 17b7433-17b7439 107->111 118 17b74a3-17b74a7 110->118 119 17b7496-17b7499 110->119 111->110 120 17b74a9-17b74b5 118->120 121 17b74b8 118->121 119->118 120->121 123 17b74b9 121->123 123->123
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 017B7421
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2459401769.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_17b0000_workbook.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: fabaf5eaf1d5c85fc3ec8c05abcf2aca30fac1240921ec94cf3519f168fece03
                                                • Instruction ID: e97c6d93061e38747d79417d47eac9a089986140224ad826147c6f08f5af0904
                                                • Opcode Fuzzy Hash: fabaf5eaf1d5c85fc3ec8c05abcf2aca30fac1240921ec94cf3519f168fece03
                                                • Instruction Fuzzy Hash: EC41BFB0C0061DCBDB24DFA9C884BDDFBB6BF88704F21816AD508AB251DB756945CF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 124 17b7364-17b736c 125 17b7370-17b7431 CreateActCtxA 124->125 127 17b743a-17b7494 125->127 128 17b7433-17b7439 125->128 135 17b74a3-17b74a7 127->135 136 17b7496-17b7499 127->136 128->127 137 17b74a9-17b74b5 135->137 138 17b74b8 135->138 136->135 137->138 140 17b74b9 138->140 140->140
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 017B7421
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2459401769.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_17b0000_workbook.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: fbd0d67efb63cf2d5f417fd2d1ea47cc07120562ed60dd5cba0d1c0d3ff09bad
                                                • Instruction ID: 6653f04042d2ac6f2f1e3148961915ed2d3d22489ba38d1390a60a2768428609
                                                • Opcode Fuzzy Hash: fbd0d67efb63cf2d5f417fd2d1ea47cc07120562ed60dd5cba0d1c0d3ff09bad
                                                • Instruction Fuzzy Hash: BA41BFB0C0061DCADB24DFA9C884BDDFBB6BF88704F25816AD508AB251DB756949CF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 141 17b6780-17b6781 142 17b671f-17b6747 141->142 143 17b6783-17b681c DuplicateHandle 141->143 145 17b674e-17b6774 142->145 146 17b6749 call 17b611c 142->146 147 17b681e-17b6824 143->147 148 17b6825-17b6842 143->148 146->145 147->148
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 017B680F
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2459401769.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_17b0000_workbook.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 8818c505425f0fcf276f7d56d9b552f8d8b6fad41e588a3cc4bf066514124f7e
                                                • Instruction ID: 2995288196ca785354d4ee68984878f5f5c9bdc0c448cb5713a83e513873d185
                                                • Opcode Fuzzy Hash: 8818c505425f0fcf276f7d56d9b552f8d8b6fad41e588a3cc4bf066514124f7e
                                                • Instruction Fuzzy Hash: 613117B6900249AFDB01CF99D884AEEBFF5FB48310F15805AEA14A7260D7759914DFA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 153 17b6788-17b681c DuplicateHandle 154 17b681e-17b6824 153->154 155 17b6825-17b6842 153->155 154->155
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 017B680F
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2459401769.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_17b0000_workbook.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 849926ba41aaac6daf76fce82807318ba2961f4b772780cd3e5f6f811f648dbf
                                                • Instruction ID: eb48ea6f805518d37cf90e0c1017e6366d3a96b05144aa6923310afb86751aaf
                                                • Opcode Fuzzy Hash: 849926ba41aaac6daf76fce82807318ba2961f4b772780cd3e5f6f811f648dbf
                                                • Instruction Fuzzy Hash: 8A21B3B5900249AFDB10CFAAD984ADEFBF5EB48320F14841AEA14A7250D374A954CFA5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 158 17bc1f0-17bc230 159 17bc238-17bc263 GetModuleHandleW 158->159 160 17bc232-17bc235 158->160 161 17bc26c-17bc280 159->161 162 17bc265-17bc26b 159->162 160->159 162->161
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 017BC256
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2459401769.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_17b0000_workbook.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 58b646effc41bcd9d11d7a7c6bf59864951c2ae2a26de10e7574e964dbba1dec
                                                • Instruction ID: c907a3ac9fa619026504e55b85d5c0e077f5f45b62e26a61c66eb47b4b23dae3
                                                • Opcode Fuzzy Hash: 58b646effc41bcd9d11d7a7c6bf59864951c2ae2a26de10e7574e964dbba1dec
                                                • Instruction Fuzzy Hash: 0A1110B5C042498FDB10DF9AD444BDEFBF4AB88224F10852AD529B7200C379A545CFA1
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2459040850.000000000176D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0176D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_176d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6ee0b88bd5f8bfa4275a2c07a3684effea39e57c9042b1f48c6c7de392a8a9c0
                                                • Instruction ID: 7413653cf29c3b5c1a68a39c950f924eeb44c9265328fb83d107a7d85f48a00d
                                                • Opcode Fuzzy Hash: 6ee0b88bd5f8bfa4275a2c07a3684effea39e57c9042b1f48c6c7de392a8a9c0
                                                • Instruction Fuzzy Hash: F4210375614204DFDB25DF58D580B16FB69EB88314F24C5ADED8A0B242C376D407CA61
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2459040850.000000000176D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0176D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_176d000_workbook.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c21f20f9b933fcfff6280cc061701e95e78f5f46405777b46ba0931fd6c09a03
                                                • Instruction ID: a86f2749894d9f7f89815384085ef824fe5c927deab7f21c1d4ead6360d7a9ba
                                                • Opcode Fuzzy Hash: c21f20f9b933fcfff6280cc061701e95e78f5f46405777b46ba0931fd6c09a03
                                                • Instruction Fuzzy Hash: 1511BE75604284CFCB12CF54D5C4B15FB61FB88314F24C6A9DC494B656C33AD40ACB61