Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe

Overview

General Information

Sample name:pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
Analysis ID:1590630
MD5:7ced1e3728202bb14170fdbcde4f69b2
SHA1:bf67ce43accf497ffa74caa94a5c09209b974f07
SHA256:3bee4d2ab33ac3f0605136f09cba556140d62ce9a0c1bdb1639159b43ae58943
Tags:exeuser-TeamDreier
Infos:

Detection

PureLog Stealer, Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe (PID: 5392 cmdline: "C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe" MD5: 7CED1E3728202BB14170FDBCDE4F69B2)
    • pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe (PID: 5160 cmdline: "C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe" MD5: 7CED1E3728202BB14170FDBCDE4F69B2)
      • schtasks.exe (PID: 3532 cmdline: "schtasks" /create /tn "pdfdocument" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" /rl HIGHEST /f MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 2184 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Exccelworkbook.exe (PID: 6636 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" MD5: 7CED1E3728202BB14170FDBCDE4F69B2)
        • Exccelworkbook.exe (PID: 3200 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" MD5: 7CED1E3728202BB14170FDBCDE4F69B2)
        • Exccelworkbook.exe (PID: 1132 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" MD5: 7CED1E3728202BB14170FDBCDE4F69B2)
        • Exccelworkbook.exe (PID: 6288 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" MD5: 7CED1E3728202BB14170FDBCDE4F69B2)
          • schtasks.exe (PID: 6128 cmdline: "schtasks" /create /tn "pdfdocument" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" /rl HIGHEST /f MD5: 48C2FE20575769DE916F48EF0676A965)
            • conhost.exe (PID: 936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Exccelworkbook.exe (PID: 6664 cmdline: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe MD5: 7CED1E3728202BB14170FDBCDE4F69B2)
    • Exccelworkbook.exe (PID: 5204 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" MD5: 7CED1E3728202BB14170FDBCDE4F69B2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "twart.myfirewall.org:9792;rency.ydns.eu:5287;wqo9.firewall-gateway.de:8841;code1.ydns.eu:5287;wqo9.firewall-gateway.de:9792;", "SubDirectory": "SubDir", "InstallName": "Exccelworkbook.exe", "MutexName": "025351e291-5d1041-4fa37-932c7-869aeiQec514992", "StartupKey": "pdfdocument", "Tag": "CODE", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.2350603816.0000000002E97000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
    00000003.00000002.2291672265.0000000000720000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
      00000000.00000002.2265586466.0000000002F27000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        0000000A.00000002.4700727831.0000000003294000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
          00000000.00000002.2267186078.0000000003EF9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            Click to see the 14 entries
            SourceRuleDescriptionAuthorStrings
            0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.3f17590.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.3f17590.2.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.5a40000.3.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.5a40000.3.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.raw.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                      Click to see the 18 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "pdfdocument" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "pdfdocument" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe", ParentImage: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe, ParentProcessId: 6288, ParentProcessName: Exccelworkbook.exe, ProcessCommandLine: "schtasks" /create /tn "pdfdocument" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" /rl HIGHEST /f, ProcessId: 6128, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "pdfdocument" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "pdfdocument" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe", ParentImage: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, ParentProcessId: 5160, ParentProcessName: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, ProcessCommandLine: "schtasks" /create /tn "pdfdocument" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" /rl HIGHEST /f, ProcessId: 3532, ProcessName: schtasks.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-14T11:54:30.100509+010020355951Domain Observed Used for C2 Detected94.156.177.1179792192.168.2.649797TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-14T11:54:30.100509+010020276191Domain Observed Used for C2 Detected94.156.177.1179792192.168.2.649797TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.raw.unpackMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "twart.myfirewall.org:9792;rency.ydns.eu:5287;wqo9.firewall-gateway.de:8841;code1.ydns.eu:5287;wqo9.firewall-gateway.de:9792;", "SubDirectory": "SubDir", "InstallName": "Exccelworkbook.exe", "MutexName": "025351e291-5d1041-4fa37-932c7-869aeiQec514992", "StartupKey": "pdfdocument", "Tag": "CODE", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeReversingLabs: Detection: 39%
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeVirustotal: Detection: 34%Perma Link
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeReversingLabs: Detection: 39%
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.42ab150.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.2350603816.0000000002E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2291672265.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2265586466.0000000002F27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.4700727831.0000000003294000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2410546923.00000000029CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2291672265.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2309440522.0000000009F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2309440522.000000000AA92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2267186078.0000000003F37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe PID: 5392, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe PID: 5160, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Exccelworkbook.exe PID: 6636, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Exccelworkbook.exe PID: 6664, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Exccelworkbook.exe PID: 6288, type: MEMORYSTR
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeJoe Sandbox ML: detected
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeJoe Sandbox ML: detected
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.6:49814 version: TLS 1.2
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: ntCC.pdb source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, Exccelworkbook.exe.3.dr
                      Source: Binary string: ntCC.pdbSHA256 source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, Exccelworkbook.exe.3.dr

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2027619 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (Quasar CnC) : 94.156.177.117:9792 -> 192.168.2.6:49797
                      Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 94.156.177.117:9792 -> 192.168.2.6:49797
                      Source: Malware configuration extractorURLs: twart.myfirewall.org
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.42ab150.1.raw.unpack, type: UNPACKEDPE
                      Source: global trafficTCP traffic: 192.168.2.6:49797 -> 94.156.177.117:9792
                      Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
                      Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownDNS query: name: ipwho.is
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: twart.myfirewall.org
                      Source: global trafficDNS traffic detected: DNS query: ipwho.is
                      Source: Exccelworkbook.exe, 0000000A.00000002.4698075820.0000000001292000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                      Source: Exccelworkbook.exe, 0000000A.00000002.4698075820.0000000001292000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.10.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: Exccelworkbook.exe, 0000000A.00000002.4700727831.0000000003248000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipwho.is
                      Source: Exccelworkbook.exe, 0000000A.00000002.4700727831.0000000003248000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipwho.isd
                      Source: Exccelworkbook.exe, 0000000A.00000002.4700727831.0000000003294000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                      Source: Exccelworkbook.exe, 0000000A.00000002.4700727831.0000000003294000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/d
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000003.00000002.2303799911.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, Exccelworkbook.exe, 0000000A.00000002.4700727831.000000000302B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, Exccelworkbook.exe.3.drString found in binary or memory: http://tempuri.org/DataSet1.xsd
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.0000000009F31000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2267186078.0000000003F37000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.000000000AA92000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000003.00000002.2291672265.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                      Source: Exccelworkbook.exe, 0000000A.00000002.4700727831.0000000003236000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipwho.is
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.0000000009F31000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2267186078.0000000003F37000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.000000000AA92000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000003.00000002.2291672265.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Exccelworkbook.exe, 0000000A.00000002.4700727831.0000000003236000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipwho.is/
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.0000000009F31000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2267186078.0000000003F37000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.000000000AA92000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000003.00000002.2291672265.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.0000000009F31000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2267186078.0000000003F37000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.000000000AA92000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000003.00000002.2291672265.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Exccelworkbook.exe, 0000000A.00000002.4700727831.0000000003033000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.0000000009F31000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2267186078.0000000003F37000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.000000000AA92000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000003.00000002.2291672265.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
                      Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.6:49814 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeJump to behavior

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.42ab150.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.2350603816.0000000002E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2291672265.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2265586466.0000000002F27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.4700727831.0000000003294000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2410546923.00000000029CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2291672265.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2309440522.0000000009F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2309440522.000000000AA92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2267186078.0000000003F37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe PID: 5392, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe PID: 5160, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Exccelworkbook.exe PID: 6636, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Exccelworkbook.exe PID: 6664, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Exccelworkbook.exe PID: 6288, type: MEMORYSTR

                      System Summary

                      barindex
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: 3.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: 3.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 3.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.42ab150.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.42ab150.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.42ab150.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: initial sampleStatic PE information: Filename: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                      Source: initial sampleStatic PE information: Filename: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess Stats: CPU usage > 49%
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_015A42040_2_015A4204
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_015A70180_2_015A7018
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_015AD8EC0_2_015AD8EC
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_04F642E80_2_04F642E8
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_09019E180_2_09019E18
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_090160200_2_09016020
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_0901C9D80_2_0901C9D8
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_0901EA600_2_0901EA60
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_09013F500_2_09013F50
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_09013F700_2_09013F70
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_09019E080_2_09019E08
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_0901CE180_2_0901CE18
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_0901CE280_2_0901CE28
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_0901BE800_2_0901BE80
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_0901600F0_2_0901600F
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_090153000_2_09015300
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_0901D2600_2_0901D260
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_090152F00_2_090152F0
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 0_2_0901F4100_2_0901F410
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeCode function: 3_2_0328F03C3_2_0328F03C
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeCode function: 6_2_015142046_2_01514204
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeCode function: 6_2_015170186_2_01517018
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeCode function: 6_2_0151D8EC6_2_0151D8EC
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeCode function: 6_2_04ED45A86_2_04ED45A8
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeCode function: 7_2_00F142047_2_00F14204
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeCode function: 7_2_00F170187_2_00F17018
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeCode function: 7_2_00F1D8EC7_2_00F1D8EC
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeCode function: 7_2_04A042E87_2_04A042E8
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeCode function: 10_2_02FBF03C10_2_02FBF03C
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeCode function: 10_2_0556906810_2_05569068
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeCode function: 10_2_0556051810_2_05560518
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeCode function: 10_2_0556050810_2_05560508
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeCode function: 10_2_05569EE010_2_05569EE0
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeCode function: 10_2_0800B6E010_2_0800B6E0
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeCode function: 10_2_08007E4810_2_08007E48
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeCode function: 14_2_02FBF03C14_2_02FBF03C
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000000.2239954952.0000000000C4E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamentCC.exeB vs pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2263374958.000000000120E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.0000000009F31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.0000000009F31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2267186078.0000000003F37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2267186078.0000000003F37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2265586466.0000000002F27000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2267186078.0000000003EF9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2297451860.0000000005A40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000003.00000002.2291672265.0000000000720000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeBinary or memory string: OriginalFilenamentCC.exeB vs pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: 3.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: 3.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 3.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.42ab150.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.42ab150.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.42ab150.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@20/5@2/2
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.logJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMutant created: NULL
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMutant created: \Sessions\1\BaseNamedObjects\Local\025351e291-5d1041-4fa37-932c7-869aeiQec514992
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2184:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:936:120:WilError_03
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: Exccelworkbook.exe.3.drBinary or memory string: INSERT INTO users (first_name, last_name, email, [password]) VALUES (@firstName, @lastName, @email, @password);
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeVirustotal: Detection: 34%
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeReversingLabs: Detection: 39%
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeFile read: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe "C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe"
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess created: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe "C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe"
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "pdfdocument" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" /rl HIGHEST /f
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "pdfdocument" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" /rl HIGHEST /f
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess created: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe "C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "pdfdocument" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "pdfdocument" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: cryptnet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeStatic file information: File size 3779584 > 1048576
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x39a200
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: ntCC.pdb source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, Exccelworkbook.exe.3.dr
                      Source: Binary string: ntCC.pdbSHA256 source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, Exccelworkbook.exe.3.dr
                      Source: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeStatic PE information: 0xEDEB4335 [Wed Jun 27 06:52:37 2096 UTC]
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeCode function: 10_2_08008ADF push 0000005Eh; iretd 10_2_08008ADE
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeFile created: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "pdfdocument" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" /rl HIGHEST /f

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeFile opened: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe PID: 5392, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Exccelworkbook.exe PID: 6636, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Exccelworkbook.exe PID: 6664, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeMemory allocated: 15A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeMemory allocated: 2EF0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeMemory allocated: 4EF0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeMemory allocated: 9F30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeMemory allocated: 9050000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeMemory allocated: AF30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeMemory allocated: BF30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeMemory allocated: C3C0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeMemory allocated: 31E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeMemory allocated: 33C0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeMemory allocated: 31E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: 1510000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: 2E60000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: 4E60000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: 9D40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: 7260000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: AD40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: BD40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: C1C0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: ED0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: 2990000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: 4990000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: 90A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: A0A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: A3C0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: B3C0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: B7F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: 2DC0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: 3000000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: 2DC0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: 2ED0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: 3100000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeMemory allocated: 2ED0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeWindow / User API: threadDelayed 5938Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeWindow / User API: threadDelayed 3812Jump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeAPI coverage: 5.4 %
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe TID: 6540Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe TID: 5808Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe TID: 6808Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe TID: 4832Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe TID: 5892Thread sleep time: -28592453314249787s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe TID: 1912Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe TID: 6876Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: Exccelworkbook.exe, 0000000A.00000002.4715443547.0000000005877000.00000004.00000020.00020000.00000000.sdmp, Exccelworkbook.exe, 0000000A.00000002.4715443547.00000000057C6000.00000004.00000020.00020000.00000000.sdmp, Exccelworkbook.exe, 0000000A.00000002.4715443547.00000000058A9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeMemory written: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess created: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe "C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "pdfdocument" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "pdfdocument" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeQueries volume information: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeQueries volume information: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.3f17590.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.3f17590.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.5a40000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.5a40000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2267186078.0000000003EF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2297451860.0000000005A40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.42ab150.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.2350603816.0000000002E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2291672265.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2265586466.0000000002F27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.4700727831.0000000003294000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2410546923.00000000029CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2291672265.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2309440522.0000000009F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2309440522.000000000AA92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2267186078.0000000003F37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe PID: 5392, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe PID: 5160, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Exccelworkbook.exe PID: 6636, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Exccelworkbook.exe PID: 6664, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Exccelworkbook.exe PID: 6288, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.3f17590.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.3f17590.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.5a40000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.5a40000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2267186078.0000000003EF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2297451860.0000000005A40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.460cb70.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe.42ab150.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.2350603816.0000000002E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2291672265.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2265586466.0000000002F27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.4700727831.0000000003294000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2410546923.00000000029CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2291672265.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2309440522.0000000009F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2309440522.000000000AA92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2267186078.0000000003F37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe PID: 5392, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe PID: 5160, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Exccelworkbook.exe PID: 6636, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Exccelworkbook.exe PID: 6664, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Exccelworkbook.exe PID: 6288, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                      Windows Management Instrumentation
                      1
                      Scheduled Task/Job
                      111
                      Process Injection
                      1
                      Masquerading
                      11
                      Input Capture
                      1
                      Query Registry
                      Remote Services11
                      Input Capture
                      11
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Scheduled Task/Job
                      1
                      DLL Side-Loading
                      1
                      Scheduled Task/Job
                      1
                      Disable or Modify Tools
                      LSASS Memory111
                      Security Software Discovery
                      Remote Desktop Protocol1
                      Archive Collected Data
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      DLL Side-Loading
                      41
                      Virtualization/Sandbox Evasion
                      Security Account Manager1
                      Process Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive1
                      Ingress Tool Transfer
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                      Process Injection
                      NTDS41
                      Virtualization/Sandbox Evasion
                      Distributed Component Object ModelInput Capture2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Hidden Files and Directories
                      LSA Secrets1
                      Application Window Discovery
                      SSHKeylogging113
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      System Network Configuration Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      Timestomp
                      DCSync23
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590630 Sample: pdf_2025 QUOTATION - #20240... Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 46 twart.myfirewall.org 2->46 48 ipwho.is 2->48 50 bg.microsoft.map.fastly.net 2->50 58 Suricata IDS alerts for network traffic 2->58 60 Found malware configuration 2->60 62 Malicious sample detected (through community Yara rule) 2->62 64 10 other signatures 2->64 11 pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe 3 2->11         started        15 Exccelworkbook.exe 2 2->15         started        signatures3 process4 file5 44 pdf_2025 QUOTATION... (83kb).com.exe.log, ASCII 11->44 dropped 70 Injects a PE file into a foreign processes 11->70 17 pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe 4 11->17         started        21 Exccelworkbook.exe 2 15->21         started        signatures6 process7 file8 42 C:\Users\user\AppData\...xccelworkbook.exe, PE32 17->42 dropped 56 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->56 23 Exccelworkbook.exe 3 17->23         started        26 schtasks.exe 1 17->26         started        signatures9 process10 signatures11 66 Multi AV Scanner detection for dropped file 23->66 68 Machine Learning detection for dropped file 23->68 28 Exccelworkbook.exe 15 2 23->28         started        32 Exccelworkbook.exe 23->32         started        34 Exccelworkbook.exe 23->34         started        36 conhost.exe 26->36         started        process12 dnsIp13 52 twart.myfirewall.org 94.156.177.117, 49797, 9792 NET1-ASBG Bulgaria 28->52 54 ipwho.is 195.201.57.90, 443, 49814 HETZNER-ASDE Germany 28->54 72 Hides that the sample has been downloaded from the Internet (zone.identifier) 28->72 74 Installs a global keyboard hook 28->74 38 schtasks.exe 1 28->38         started        signatures14 process15 process16 40 conhost.exe 38->40         started       

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe35%VirustotalBrowse
                      pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe39%ReversingLabsWin32.Trojan.Leonem
                      pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe39%ReversingLabsWin32.Trojan.Leonem
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://schemas.datacontract.org/2004/07/d0%Avira URL Cloudsafe
                      http://ipwho.isd0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      bg.microsoft.map.fastly.net
                      199.232.214.172
                      truefalse
                        high
                        ipwho.is
                        195.201.57.90
                        truefalse
                          high
                          s-part-0017.t-0009.fb-t-msedge.net
                          13.107.253.45
                          truefalse
                            high
                            twart.myfirewall.org
                            94.156.177.117
                            truefalse
                              high
                              NameMaliciousAntivirus DetectionReputation
                              twart.myfirewall.orgfalse
                                high
                                https://ipwho.is/false
                                  high
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://api.ipify.org/pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.0000000009F31000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2267186078.0000000003F37000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.000000000AA92000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000003.00000002.2291672265.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.datacontract.org/2004/07/dExccelworkbook.exe, 0000000A.00000002.4700727831.0000000003294000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://stackoverflow.com/q/14436606/23354pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.0000000009F31000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2267186078.0000000003F37000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.000000000AA92000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000003.00000002.2291672265.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Exccelworkbook.exe, 0000000A.00000002.4700727831.0000000003033000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://schemas.datacontract.org/2004/07/Exccelworkbook.exe, 0000000A.00000002.4700727831.0000000003294000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://stackoverflow.com/q/11564914/23354;pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.0000000009F31000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2267186078.0000000003F37000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.000000000AA92000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000003.00000002.2291672265.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                          high
                                          http://ipwho.isdExccelworkbook.exe, 0000000A.00000002.4700727831.0000000003248000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://tempuri.org/DataSet1.xsdpdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, Exccelworkbook.exe.3.drfalse
                                            high
                                            https://ipwho.isExccelworkbook.exe, 0000000A.00000002.4700727831.0000000003236000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://stackoverflow.com/q/2152978/23354sCannotpdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.0000000009F31000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2267186078.0000000003F37000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000000.00000002.2309440522.000000000AA92000.00000004.00000800.00020000.00000000.sdmp, pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000003.00000002.2291672265.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe, 00000003.00000002.2303799911.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, Exccelworkbook.exe, 0000000A.00000002.4700727831.000000000302B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://ipwho.isExccelworkbook.exe, 0000000A.00000002.4700727831.0000000003248000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    94.156.177.117
                                                    twart.myfirewall.orgBulgaria
                                                    43561NET1-ASBGfalse
                                                    195.201.57.90
                                                    ipwho.isGermany
                                                    24940HETZNER-ASDEfalse
                                                    Joe Sandbox version:42.0.0 Malachite
                                                    Analysis ID:1590630
                                                    Start date and time:2025-01-14 11:53:12 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 9m 46s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:16
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                                                    Detection:MAL
                                                    Classification:mal100.troj.spyw.evad.winEXE@20/5@2/2
                                                    EGA Information:
                                                    • Successful, ratio: 100%
                                                    HCA Information:
                                                    • Successful, ratio: 99%
                                                    • Number of executed functions: 176
                                                    • Number of non-executed functions: 13
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .exe
                                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                    • Excluded IPs from analysis (whitelisted): 199.232.214.172, 13.107.253.45, 2.23.242.162, 172.202.163.200
                                                    • Excluded domains from analysis (whitelisted): azurefd-t-fb-prod.trafficmanager.net, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                    TimeTypeDescription
                                                    05:54:17API Interceptor1x Sleep call for process: pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe modified
                                                    05:54:22API Interceptor9750352x Sleep call for process: Exccelworkbook.exe modified
                                                    11:54:07Task SchedulerRun new task: {B6B2796E-8847-4D15-8C43-AE464551DC67} path: .
                                                    11:54:22Task SchedulerRun new task: pdfdocument path: C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    94.156.177.117UoEDaAjHGW.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                                                      QUOTATION-9044456778.pdf (83kb).com.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                                                        QUOTATION - RFQ2496_PO 08775622879.pdf(87kb).com.exeGet hashmaliciousQuasarBrowse
                                                          195.201.57.90SPt4FUjZMt.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, PythonCryptoHijacker, RedLineBrowse
                                                          • /?output=json
                                                          765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                                                          • /?output=json
                                                          765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                                                          • /?output=json
                                                          WfKynArKjH.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, RedLineBrowse
                                                          • /?output=json
                                                          ubes6SC7Vd.exeGet hashmaliciousUnknownBrowse
                                                          • ipwhois.app/xml/
                                                          cOQD62FceM.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                                                          • /?output=json
                                                          Clipper.exeGet hashmaliciousUnknownBrowse
                                                          • /?output=json
                                                          cOQD62FceM.exeGet hashmaliciousLuca StealerBrowse
                                                          • /?output=json
                                                          Cryptor.exeGet hashmaliciousLuca StealerBrowse
                                                          • /?output=json
                                                          Cryptor.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                                                          • /?output=json
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          ipwho.isUoEDaAjHGW.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                                                          • 195.201.57.90
                                                          RFQ.exeGet hashmaliciousQuasar, PureLog StealerBrowse
                                                          • 195.201.57.90
                                                          QUOTATION-9044456778.pdf (83kb).com.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                                                          • 195.201.57.90
                                                          QUOTATION - RFQ2496_PO 08775622879.pdf(87kb).com.exeGet hashmaliciousQuasarBrowse
                                                          • 195.201.57.90
                                                          UXxZ4m65ro.exeGet hashmaliciousQuasarBrowse
                                                          • 195.201.57.90
                                                          ny9LDJr6pA.exeGet hashmaliciousQuasarBrowse
                                                          • 195.201.57.90
                                                          jaTDEkWCbs.exeGet hashmaliciousQuasarBrowse
                                                          • 195.201.57.90
                                                          2Mi3lKoJfj.exeGet hashmaliciousQuasarBrowse
                                                          • 195.201.57.90
                                                          YJaaZuNHwI.exeGet hashmaliciousQuasarBrowse
                                                          • 195.201.57.90
                                                          Flasher.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                                                          • 108.181.61.49
                                                          s-part-0017.t-0009.fb-t-msedge.netRFQ____PC25-1301.xlsxGet hashmaliciousUnknownBrowse
                                                          • 13.107.253.45
                                                          https://Rtasia-sharepoint.zonivarnoth.ru/ITb4aThU/#Deddie.chan@rtasia.com.hkGet hashmaliciousUnknownBrowse
                                                          • 13.107.253.45
                                                          JDQS879kiy.exeGet hashmaliciousDBatLoaderBrowse
                                                          • 13.107.253.45
                                                          3.19.1+SetupWIService.exeGet hashmaliciousUnknownBrowse
                                                          • 13.107.253.45
                                                          https://app.box.com/s/it1hhxczqyf0qxif41bma48tat7sqs32Get hashmaliciousHTMLPhisherBrowse
                                                          • 13.107.253.45
                                                          http://id1223.adsalliance.xyzGet hashmaliciousUnknownBrowse
                                                          • 13.107.253.45
                                                          NursultanAlphaCrack.bat.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                          • 13.107.253.45
                                                          https://sites.google.com/view/01-25sharepoint/Get hashmaliciousHTMLPhisherBrowse
                                                          • 13.107.253.45
                                                          YYYY-NNN AUDIT DETAIL REPORT .docxGet hashmaliciousUnknownBrowse
                                                          • 13.107.253.45
                                                          setup64v.2.9.7.msiGet hashmaliciousUnknownBrowse
                                                          • 13.107.253.45
                                                          twart.myfirewall.orgUoEDaAjHGW.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                                                          • 94.156.177.117
                                                          QUOTATION-9044456778.pdf (83kb).com.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                                                          • 127.0.0.4
                                                          QUOTATION - RFQ2496_PO 08775622879.pdf(87kb).com.exeGet hashmaliciousQuasarBrowse
                                                          • 127.0.0.4
                                                          Zam#U00f3wienie 89118 _ Metal-Constructions.pdf.com.exeGet hashmaliciousQuasarBrowse
                                                          • 45.88.3.229
                                                          Pedido09669281099195.com.exeGet hashmaliciousDarkTortilla, QuasarBrowse
                                                          • 213.159.74.80
                                                          doc_Pedido 02024091622008176.com.exeGet hashmaliciousQuasarBrowse
                                                          • 213.159.74.80
                                                          doc_Zapytanie - Oferta POLSKA 91044PL.com.exeGet hashmaliciousQuasarBrowse
                                                          • 213.159.74.80
                                                          doc_Zapytanie - Oferta KH 09281.com.exeGet hashmaliciousQuasarBrowse
                                                          • 213.159.74.80
                                                          doc_rfq Oferta KH 09281.pdf.com.exeGet hashmaliciousQuasarBrowse
                                                          • 213.159.74.80
                                                          Client.exeGet hashmaliciousQuasarBrowse
                                                          • 213.159.74.80
                                                          bg.microsoft.map.fastly.netPO 2025918 pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                          • 199.232.210.172
                                                          1579614525244583223.jsGet hashmaliciousStrela DownloaderBrowse
                                                          • 199.232.210.172
                                                          New purchase order.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                          • 199.232.210.172
                                                          35491083472324549.jsGet hashmaliciousStrela DownloaderBrowse
                                                          • 199.232.214.172
                                                          28236151432955330765.jsGet hashmaliciousStrela DownloaderBrowse
                                                          • 199.232.210.172
                                                          ProductBOMpq_v4.xlsmGet hashmaliciousUnknownBrowse
                                                          • 199.232.214.172
                                                          17201670993971103.jsGet hashmaliciousStrela DownloaderBrowse
                                                          • 199.232.214.172
                                                          Scanned-IMGS_from NomanGroup IDT.scr.exeGet hashmaliciousFormBookBrowse
                                                          • 199.232.210.172
                                                          12.exeGet hashmaliciousUnknownBrowse
                                                          • 199.232.214.172
                                                          UoEDaAjHGW.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                                                          • 199.232.210.172
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          HETZNER-ASDEna.elfGet hashmaliciousPrometeiBrowse
                                                          • 88.198.246.242
                                                          na.elfGet hashmaliciousPrometeiBrowse
                                                          • 88.198.246.242
                                                          na.elfGet hashmaliciousPrometeiBrowse
                                                          • 88.198.246.242
                                                          UoEDaAjHGW.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                                                          • 195.201.57.90
                                                          na.elfGet hashmaliciousPrometeiBrowse
                                                          • 88.198.246.242
                                                          RFQ.exeGet hashmaliciousQuasar, PureLog StealerBrowse
                                                          • 195.201.57.90
                                                          na.elfGet hashmaliciousPrometeiBrowse
                                                          • 88.198.246.242
                                                          na.elfGet hashmaliciousPrometeiBrowse
                                                          • 88.198.246.242
                                                          na.elfGet hashmaliciousPrometeiBrowse
                                                          • 88.198.246.242
                                                          na.elfGet hashmaliciousPrometeiBrowse
                                                          • 88.198.246.242
                                                          NET1-ASBGUoEDaAjHGW.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                                                          • 94.156.177.117
                                                          kzQ25HVUbf.exeGet hashmaliciousLokibotBrowse
                                                          • 94.156.177.41
                                                          YvVDV4cbjy.exeGet hashmaliciousLokibotBrowse
                                                          • 94.156.177.41
                                                          EozUxz4ybi.exeGet hashmaliciousLokibotBrowse
                                                          • 94.156.177.41
                                                          oAUBqI6vQ7.exeGet hashmaliciousLokibotBrowse
                                                          • 94.156.177.41
                                                          IpykYx5iwz.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                          • 94.156.177.164
                                                          QUOTATION-9044456778.pdf (83kb).com.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                                                          • 94.156.177.117
                                                          Fantazy.i486.elfGet hashmaliciousUnknownBrowse
                                                          • 95.87.199.40
                                                          Fantazy.x86_64.elfGet hashmaliciousUnknownBrowse
                                                          • 93.123.77.220
                                                          Kloki.arm7.elfGet hashmaliciousUnknownBrowse
                                                          • 83.222.191.90
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          3b5074b1b5d032e5620f69f9f700ff0e12.exeGet hashmaliciousUnknownBrowse
                                                          • 195.201.57.90
                                                          https://cys-bombasml.comGet hashmaliciousUnknownBrowse
                                                          • 195.201.57.90
                                                          UoEDaAjHGW.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                                                          • 195.201.57.90
                                                          009.vbeGet hashmaliciousAgentTeslaBrowse
                                                          • 195.201.57.90
                                                          RFQ.exeGet hashmaliciousQuasar, PureLog StealerBrowse
                                                          • 195.201.57.90
                                                          PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 195.201.57.90
                                                          https://performancemanager10.successfactors.com/sf/hrisworkflowapprovelink?workflowRequestId=V4-0-a1-iHQRWD3bQis7XhhWNKzjfWwnvURbEsN0CxUc27Zt3ml0ag&company=oceanagoldT2&username=dave.oliver@oceanagold.comGet hashmaliciousUnknownBrowse
                                                          • 195.201.57.90
                                                          https://imtcoken.im/Get hashmaliciousUnknownBrowse
                                                          • 195.201.57.90
                                                          https://ipfs.io/ipfs/bafkreidfpb2invnj4i76skys5sfmk3hycbkxhquyb7d6uhnbls3gwf4a5qGet hashmaliciousHTMLPhisherBrowse
                                                          • 195.201.57.90
                                                          http://pub-575fb9d74c7a46f0828b37cda8dd9c40.r2.dev/docu/e_protocol.html?eGet hashmaliciousHTMLPhisherBrowse
                                                          • 195.201.57.90
                                                          No context
                                                          Process:C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe
                                                          File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                          Category:dropped
                                                          Size (bytes):71954
                                                          Entropy (8bit):7.996617769952133
                                                          Encrypted:true
                                                          SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                          MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                          SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                          SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                          SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                          Malicious:false
                                                          Reputation:high, very likely benign file
                                                          Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                          Process:C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):328
                                                          Entropy (8bit):3.2360072131993585
                                                          Encrypted:false
                                                          SSDEEP:6:kK8z9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:LDImsLNkPlE99SNxAhUe/3
                                                          MD5:F6A253DAB0B9C4A86FB082A9E96B50AA
                                                          SHA1:0B2131944267B7FF4AF64179D3C3BDE7F7E68AFE
                                                          SHA-256:8BA5C1F90BC026E823B0A7F6DCB3952E9A36118149965E6FCE0F5109301241BB
                                                          SHA-512:B0954C0C6AEFFE55C2C028E66EB71FFB3FE35260270C1FE5C5F41DC233FACD85019E763321C45561DDBE1261F88D2E2FB4CA09CB2BDEFB7161665CBBF8C66A52
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:p...... ..........k.sf..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                          Process:C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1216
                                                          Entropy (8bit):5.34331486778365
                                                          Encrypted:false
                                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                          Malicious:false
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                          Process:C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1216
                                                          Entropy (8bit):5.34331486778365
                                                          Encrypted:false
                                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                          Malicious:true
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                          Process:C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):3779584
                                                          Entropy (8bit):7.97695133421818
                                                          Encrypted:false
                                                          SSDEEP:98304:K4QM2Ie6bMOMcv6NVhbK3H055W5XHx85mSQVaT+50WkdEZM:lsILGjbKkfWhHW5mnVapWcg
                                                          MD5:7CED1E3728202BB14170FDBCDE4F69B2
                                                          SHA1:BF67CE43ACCF497FFA74CAA94A5C09209B974F07
                                                          SHA-256:3BEE4D2AB33AC3F0605136F09CBA556140D62CE9A0C1BDB1639159B43AE58943
                                                          SHA-512:E71A9B4EC8AB4CB18C990E77ECB2FEA86DD28CB769274BC34B31095B8124985EDF4A5B3426C4CAD59429CCAE85726FCB476CF6E4053AF0D902C4BB05CA703B3C
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 39%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...5C................0...9.........j.9.. ....9...@.. ....................... :...........@...................................9.O.....9.......................:.....D.9.p............................................ ............... ..H............text.....9.. ....9................. ..`.rsrc.........9.......9.............@..@.reloc........:.......9.............@..B................I.9.....H.......hK..\=......9....... 9..........................................0..L.........}.....(.......(......(............s......(.....o......( ....o!.....("....*.0..K.........}........(#........($.....,5...(............s......(.....o......(.....o!....8.....r...p.J...(%...o&...tJ.......('..........9.....s.........s(...s)...o*.......o+...(,.......o-...(........o/...(0.......o1...(2.......o3...(4.......o5...(6.........(7.....(......+....s(...s)...(*........(8...........s......(..
                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):7.97695133421818
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          • DOS Executable Generic (2002/1) 0.01%
                                                          File name:pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                                                          File size:3'779'584 bytes
                                                          MD5:7ced1e3728202bb14170fdbcde4f69b2
                                                          SHA1:bf67ce43accf497ffa74caa94a5c09209b974f07
                                                          SHA256:3bee4d2ab33ac3f0605136f09cba556140d62ce9a0c1bdb1639159b43ae58943
                                                          SHA512:e71a9b4ec8ab4cb18c990e77ecb2fea86dd28cb769274bc34b31095b8124985edf4a5b3426c4cad59429ccae85726fcb476cf6e4053af0d902c4bb05ca703b3c
                                                          SSDEEP:98304:K4QM2Ie6bMOMcv6NVhbK3H055W5XHx85mSQVaT+50WkdEZM:lsILGjbKkfWhHW5mnVapWcg
                                                          TLSH:1906338465AADE01D08927391CE3E3F89B36BD96C560C613EFE93FE37D69B122101647
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...5C................0...9.........j.9.. ....9...@.. ....................... :...........@................................
                                                          Icon Hash:00928e8e8686b000
                                                          Entrypoint:0x79c16a
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0xEDEB4335 [Wed Jun 27 06:52:37 2096 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          call far 0000h : 003E9999h
                                                          aas
                                                          int CCh
                                                          dec esp
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x39c1150x4f.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x39e0000x5e0.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x3a00000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x39a9440x70.text
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000x39a1800x39a20066406ca4ba88bf338b43d6cdb2596f36unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rsrc0x39e0000x5e00x6009034714c9c73dc8be119cca0dad41335False0.4322916666666667data4.160248195079538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x3a00000xc0x200b7b8c5f607bfcf11a1b7754e61120a9fFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_VERSION0x39e0900x350data0.4233490566037736
                                                          RT_MANIFEST0x39e3f00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                          DLLImport
                                                          mscoree.dll_CorExeMain
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2025-01-14T11:54:30.100509+01002027619ET MALWARE Observed Malicious SSL Cert (Quasar CnC)194.156.177.1179792192.168.2.649797TCP
                                                          2025-01-14T11:54:30.100509+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert194.156.177.1179792192.168.2.649797TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 14, 2025 11:54:29.354471922 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:54:29.360608101 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:54:29.360693932 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:54:29.366621017 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:54:29.372612000 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:54:30.091381073 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:54:30.091403008 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:54:30.091501951 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:54:30.095360041 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:54:30.100508928 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:54:30.327966928 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:54:30.374541998 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:54:31.962424994 CET49814443192.168.2.6195.201.57.90
                                                          Jan 14, 2025 11:54:31.962476015 CET44349814195.201.57.90192.168.2.6
                                                          Jan 14, 2025 11:54:31.962531090 CET49814443192.168.2.6195.201.57.90
                                                          Jan 14, 2025 11:54:31.963490009 CET49814443192.168.2.6195.201.57.90
                                                          Jan 14, 2025 11:54:31.963530064 CET44349814195.201.57.90192.168.2.6
                                                          Jan 14, 2025 11:54:32.813080072 CET44349814195.201.57.90192.168.2.6
                                                          Jan 14, 2025 11:54:32.813185930 CET49814443192.168.2.6195.201.57.90
                                                          Jan 14, 2025 11:54:32.818753958 CET49814443192.168.2.6195.201.57.90
                                                          Jan 14, 2025 11:54:32.818766117 CET44349814195.201.57.90192.168.2.6
                                                          Jan 14, 2025 11:54:32.819056988 CET44349814195.201.57.90192.168.2.6
                                                          Jan 14, 2025 11:54:32.825184107 CET49814443192.168.2.6195.201.57.90
                                                          Jan 14, 2025 11:54:32.871334076 CET44349814195.201.57.90192.168.2.6
                                                          Jan 14, 2025 11:54:33.016243935 CET44349814195.201.57.90192.168.2.6
                                                          Jan 14, 2025 11:54:33.016319990 CET44349814195.201.57.90192.168.2.6
                                                          Jan 14, 2025 11:54:33.016496897 CET49814443192.168.2.6195.201.57.90
                                                          Jan 14, 2025 11:54:33.085829973 CET49814443192.168.2.6195.201.57.90
                                                          Jan 14, 2025 11:54:33.362149954 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:54:33.367074966 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:54:33.367135048 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:54:33.371968985 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:54:33.893984079 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:54:33.968179941 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:54:34.080080032 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:54:34.171310902 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:54:59.093360901 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:54:59.098212957 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:55:24.108884096 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:55:24.113720894 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:55:49.124541044 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:55:49.129976988 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:56:14.140187979 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:56:14.144957066 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:56:39.185142040 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:56:39.190042019 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:57:04.195198059 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:57:04.202353001 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:57:29.202706099 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:57:29.207653046 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:57:54.218369007 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:57:54.223427057 CET97924979794.156.177.117192.168.2.6
                                                          Jan 14, 2025 11:58:19.234774113 CET497979792192.168.2.694.156.177.117
                                                          Jan 14, 2025 11:58:19.239759922 CET97924979794.156.177.117192.168.2.6
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 14, 2025 11:54:29.306684971 CET6392053192.168.2.61.1.1.1
                                                          Jan 14, 2025 11:54:29.321928024 CET53639201.1.1.1192.168.2.6
                                                          Jan 14, 2025 11:54:31.951817989 CET5699053192.168.2.61.1.1.1
                                                          Jan 14, 2025 11:54:31.958740950 CET53569901.1.1.1192.168.2.6
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Jan 14, 2025 11:54:29.306684971 CET192.168.2.61.1.1.10x32dcStandard query (0)twart.myfirewall.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 11:54:31.951817989 CET192.168.2.61.1.1.10xa003Standard query (0)ipwho.isA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Jan 14, 2025 11:54:12.754465103 CET1.1.1.1192.168.2.60x3b3eNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.netazurefd-t-fb-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                                          Jan 14, 2025 11:54:12.754465103 CET1.1.1.1192.168.2.60x3b3eNo error (0)dual.s-part-0017.t-0009.fb-t-msedge.nets-part-0017.t-0009.fb-t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                          Jan 14, 2025 11:54:12.754465103 CET1.1.1.1192.168.2.60x3b3eNo error (0)s-part-0017.t-0009.fb-t-msedge.net13.107.253.45A (IP address)IN (0x0001)false
                                                          Jan 14, 2025 11:54:29.321928024 CET1.1.1.1192.168.2.60x32dcNo error (0)twart.myfirewall.org94.156.177.117A (IP address)IN (0x0001)false
                                                          Jan 14, 2025 11:54:31.167386055 CET1.1.1.1192.168.2.60x6625No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                          Jan 14, 2025 11:54:31.167386055 CET1.1.1.1192.168.2.60x6625No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                          Jan 14, 2025 11:54:31.958740950 CET1.1.1.1192.168.2.60xa003No error (0)ipwho.is195.201.57.90A (IP address)IN (0x0001)false
                                                          • ipwho.is
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.649814195.201.57.904436288C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe
                                                          TimestampBytes transferredDirectionData
                                                          2025-01-14 10:54:32 UTC150OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0
                                                          Host: ipwho.is
                                                          Connection: Keep-Alive
                                                          2025-01-14 10:54:33 UTC223INHTTP/1.1 200 OK
                                                          Date: Tue, 14 Jan 2025 10:54:32 GMT
                                                          Content-Type: application/json; charset=utf-8
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          Server: ipwhois
                                                          Access-Control-Allow-Headers: *
                                                          X-Robots-Tag: noindex
                                                          2025-01-14 10:54:33 UTC1021INData Raw: 33 66 31 0d 0a 7b 0a 20 20 20 20 22 41 62 6f 75 74 20 55 73 22 3a 20 22 68 74 74 70 73 3a 5c 2f 5c 2f 69 70 77 68 6f 69 73 2e 69 6f 22 2c 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 20 20 22 73 75 63 63 65 73 73 22 3a 20 74 72 75 65 2c 0a 20 20 20 20 22 74 79 70 65 22 3a 20 22 49 50 76 34 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 20 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 20 22 4e 41 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f
                                                          Data Ascii: 3f1{ "About Us": "https:\/\/ipwhois.io", "ip": "8.46.123.189", "success": true, "type": "IPv4", "continent": "North America", "continent_code": "NA", "country": "United States", "country_code": "US", "region": "New Yo


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:05:54:16
                                                          Start date:14/01/2025
                                                          Path:C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe"
                                                          Imagebase:0x8b0000
                                                          File size:3'779'584 bytes
                                                          MD5 hash:7CED1E3728202BB14170FDBCDE4F69B2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.2265586466.0000000002F27000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2267186078.0000000003EF9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2297451860.0000000005A40000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.2309440522.0000000009F31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.2309440522.000000000AA92000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.2267186078.0000000003F37000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:3
                                                          Start time:05:54:18
                                                          Start date:14/01/2025
                                                          Path:C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\pdf_2025 QUOTATION - #202401146778.pdf (83kb).com.exe"
                                                          Imagebase:0xd20000
                                                          File size:3'779'584 bytes
                                                          MD5 hash:7CED1E3728202BB14170FDBCDE4F69B2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000003.00000002.2291672265.0000000000720000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000003.00000002.2291672265.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:4
                                                          Start time:05:54:21
                                                          Start date:14/01/2025
                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"schtasks" /create /tn "pdfdocument" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" /rl HIGHEST /f
                                                          Imagebase:0x550000
                                                          File size:187'904 bytes
                                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:5
                                                          Start time:05:54:21
                                                          Start date:14/01/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff66e660000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:6
                                                          Start time:05:54:21
                                                          Start date:14/01/2025
                                                          Path:C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"
                                                          Imagebase:0x820000
                                                          File size:3'779'584 bytes
                                                          MD5 hash:7CED1E3728202BB14170FDBCDE4F69B2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000006.00000002.2350603816.0000000002E97000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Antivirus matches:
                                                          • Detection: 100%, Joe Sandbox ML
                                                          • Detection: 39%, ReversingLabs
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:7
                                                          Start time:05:54:22
                                                          Start date:14/01/2025
                                                          Path:C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe
                                                          Imagebase:0x2a0000
                                                          File size:3'779'584 bytes
                                                          MD5 hash:7CED1E3728202BB14170FDBCDE4F69B2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000007.00000002.2410546923.00000000029CC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:8
                                                          Start time:05:54:24
                                                          Start date:14/01/2025
                                                          Path:C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"
                                                          Imagebase:0x20000
                                                          File size:3'779'584 bytes
                                                          MD5 hash:7CED1E3728202BB14170FDBCDE4F69B2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:9
                                                          Start time:05:54:24
                                                          Start date:14/01/2025
                                                          Path:C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"
                                                          Imagebase:0x220000
                                                          File size:3'779'584 bytes
                                                          MD5 hash:7CED1E3728202BB14170FDBCDE4F69B2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:10
                                                          Start time:05:54:24
                                                          Start date:14/01/2025
                                                          Path:C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"
                                                          Imagebase:0x8e0000
                                                          File size:3'779'584 bytes
                                                          MD5 hash:7CED1E3728202BB14170FDBCDE4F69B2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000000A.00000002.4700727831.0000000003294000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:11
                                                          Start time:05:54:27
                                                          Start date:14/01/2025
                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"schtasks" /create /tn "pdfdocument" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe" /rl HIGHEST /f
                                                          Imagebase:0x550000
                                                          File size:187'904 bytes
                                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:12
                                                          Start time:05:54:27
                                                          Start date:14/01/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff66e660000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:14
                                                          Start time:05:54:32
                                                          Start date:14/01/2025
                                                          Path:C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Roaming\SubDir\Exccelworkbook.exe"
                                                          Imagebase:0x9f0000
                                                          File size:3'779'584 bytes
                                                          MD5 hash:7CED1E3728202BB14170FDBCDE4F69B2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:9.6%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:1.6%
                                                            Total number of Nodes:187
                                                            Total number of Limit Nodes:11
                                                            execution_graph 30045 9010170 CloseHandle 30046 90101d7 30045->30046 30026 15ad9c8 DuplicateHandle 30027 15ada5e 30026->30027 30028 15ad378 30029 15ad3be GetCurrentProcess 30028->30029 30031 15ad410 GetCurrentThread 30029->30031 30034 15ad409 30029->30034 30032 15ad44d GetCurrentProcess 30031->30032 30033 15ad446 30031->30033 30035 15ad483 30032->30035 30033->30032 30034->30031 30036 15ad4ab GetCurrentThreadId 30035->30036 30037 15ad4dc 30036->30037 30047 15a4668 30048 15a467a 30047->30048 30049 15a4686 30048->30049 30053 15a4778 30048->30053 30058 15a4204 30049->30058 30051 15a46a5 30054 15a479d 30053->30054 30062 15a4878 30054->30062 30066 15a4888 30054->30066 30059 15a420f 30058->30059 30074 15a5cc4 30059->30074 30061 15a7083 30061->30051 30064 15a4888 30062->30064 30063 15a498c 30063->30063 30064->30063 30070 15a44f0 30064->30070 30068 15a48af 30066->30068 30067 15a498c 30067->30067 30068->30067 30069 15a44f0 CreateActCtxA 30068->30069 30069->30067 30071 15a5918 CreateActCtxA 30070->30071 30073 15a59db 30071->30073 30075 15a5cc9 30074->30075 30078 15a5ce4 30075->30078 30077 15a7315 30077->30061 30079 15a5cef 30078->30079 30082 15a5d14 30079->30082 30081 15a73fa 30081->30077 30083 15a5d1f 30082->30083 30086 15a5d44 30083->30086 30085 15a74ed 30085->30081 30087 15a5d4f 30086->30087 30089 15a87eb 30087->30089 30092 15aae99 30087->30092 30088 15a8829 30088->30085 30089->30088 30096 15acf80 30089->30096 30102 15aaed0 30092->30102 30105 15aaec1 30092->30105 30093 15aaeae 30093->30089 30097 15acf86 30096->30097 30098 15acf35 30096->30098 30099 15acfd5 30097->30099 30113 15ad250 30097->30113 30117 15ad260 30097->30117 30098->30088 30099->30088 30108 15ab3b1 30102->30108 30103 15aaedf 30103->30093 30106 15aaedf 30105->30106 30107 15ab3b1 GetModuleHandleW 30105->30107 30106->30093 30107->30106 30109 15ab404 30108->30109 30110 15ab3e1 30108->30110 30109->30103 30110->30109 30111 15ab608 GetModuleHandleW 30110->30111 30112 15ab635 30111->30112 30112->30103 30115 15ad260 30113->30115 30114 15ad2a7 30114->30099 30115->30114 30121 15ab2e8 30115->30121 30119 15ad26d 30117->30119 30118 15ab2e8 GetModuleHandleW 30120 15ad2a7 30118->30120 30119->30118 30119->30120 30120->30099 30122 15ab2f3 30121->30122 30124 15adfc0 30122->30124 30125 15ad60c 30122->30125 30124->30124 30126 15ad617 30125->30126 30127 15a5d44 GetModuleHandleW 30126->30127 30128 15ae02f 30127->30128 30128->30124 30129 4f6038d 30130 4f6039d 30129->30130 30131 4f603a8 30130->30131 30135 4f60b50 30130->30135 30140 4f60bae 30130->30140 30146 4f60b40 30130->30146 30136 4f60b6a 30135->30136 30151 4f60e78 30136->30151 30164 4f60e68 30136->30164 30137 4f60b8e 30137->30131 30141 4f60b3c 30140->30141 30143 4f60bb1 30140->30143 30144 4f60e78 12 API calls 30141->30144 30145 4f60e68 12 API calls 30141->30145 30142 4f60b8e 30142->30131 30143->30131 30144->30142 30145->30142 30147 4f60b6a 30146->30147 30149 4f60e78 12 API calls 30147->30149 30150 4f60e68 12 API calls 30147->30150 30148 4f60b8e 30148->30131 30149->30148 30150->30148 30152 4f60e8d 30151->30152 30160 4f60e9f 30152->30160 30177 4f6123a 30152->30177 30184 4f6102c 30152->30184 30189 4f611df 30152->30189 30194 4f615ae 30152->30194 30199 4f61160 30152->30199 30204 4f61273 30152->30204 30209 4f60fb2 30152->30209 30213 4f61382 30152->30213 30218 4f616ab 30152->30218 30223 4f6117a 30152->30223 30160->30137 30165 4f60e8d 30164->30165 30166 4f61382 2 API calls 30165->30166 30167 4f60fb2 2 API calls 30165->30167 30168 4f61273 2 API calls 30165->30168 30169 4f61160 2 API calls 30165->30169 30170 4f615ae 2 API calls 30165->30170 30171 4f611df 2 API calls 30165->30171 30172 4f6102c 2 API calls 30165->30172 30173 4f60e9f 30165->30173 30174 4f6123a 4 API calls 30165->30174 30175 4f6117a 2 API calls 30165->30175 30176 4f616ab 2 API calls 30165->30176 30166->30173 30167->30173 30168->30173 30169->30173 30170->30173 30171->30173 30172->30173 30173->30137 30174->30173 30175->30173 30176->30173 30227 901f330 30177->30227 30231 901f338 30177->30231 30178 4f61254 30178->30160 30235 901f281 30178->30235 30239 901f288 30178->30239 30179 4f61908 30185 4f6104f 30184->30185 30243 901f900 30185->30243 30247 901f908 30185->30247 30186 4f6162c 30186->30160 30190 4f611ec 30189->30190 30251 901f9f0 30190->30251 30255 901f9f8 30190->30255 30191 4f611ad 30195 4f615b4 30194->30195 30197 901f900 WriteProcessMemory 30195->30197 30198 901f908 WriteProcessMemory 30195->30198 30196 4f61014 30197->30196 30198->30196 30200 4f61166 30199->30200 30202 901f281 ResumeThread 30200->30202 30203 901f288 ResumeThread 30200->30203 30201 4f61908 30202->30201 30203->30201 30205 4f61279 30204->30205 30207 901f281 ResumeThread 30205->30207 30208 901f288 ResumeThread 30205->30208 30206 4f61908 30207->30206 30208->30206 30259 901fb90 30209->30259 30263 901fb8a 30209->30263 30214 4f61388 30213->30214 30216 901f330 Wow64SetThreadContext 30214->30216 30217 901f338 Wow64SetThreadContext 30214->30217 30215 4f611d7 30215->30160 30216->30215 30217->30215 30219 4f6158b 30218->30219 30219->30218 30220 4f61014 30219->30220 30221 901f900 WriteProcessMemory 30219->30221 30222 901f908 WriteProcessMemory 30219->30222 30220->30160 30221->30219 30222->30219 30267 901f841 30223->30267 30271 901f848 30223->30271 30224 4f61198 30228 901f37d Wow64SetThreadContext 30227->30228 30230 901f3c5 30228->30230 30230->30178 30232 901f37d Wow64SetThreadContext 30231->30232 30234 901f3c5 30232->30234 30234->30178 30236 901f2c8 ResumeThread 30235->30236 30238 901f2f9 30236->30238 30238->30179 30240 901f2c8 ResumeThread 30239->30240 30242 901f2f9 30240->30242 30242->30179 30244 901f905 WriteProcessMemory 30243->30244 30246 901f9a7 30244->30246 30246->30186 30248 901f950 WriteProcessMemory 30247->30248 30250 901f9a7 30248->30250 30250->30186 30252 901fa43 ReadProcessMemory 30251->30252 30254 901fa87 30252->30254 30254->30191 30256 901fa43 ReadProcessMemory 30255->30256 30258 901fa87 30256->30258 30258->30191 30260 901fc19 CreateProcessA 30259->30260 30262 901fddb 30260->30262 30264 901fc19 CreateProcessA 30263->30264 30266 901fddb 30264->30266 30268 901f888 VirtualAllocEx 30267->30268 30270 901f8c5 30268->30270 30270->30224 30272 901f888 VirtualAllocEx 30271->30272 30274 901f8c5 30272->30274 30274->30224 30038 4f62198 30039 4f62323 30038->30039 30041 4f621be 30038->30041 30041->30039 30042 4f61d90 30041->30042 30043 4f62418 PostMessageW 30042->30043 30044 4f62484 30043->30044 30044->30041
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6b5f59acbbd9afa53e9bd9a175e84d83a18c58b80a4b24e476d01ab99afccbc3
                                                            • Instruction ID: a2b224b8e9f9dff32990767e1d55a32d63f12b83be508711b092326152568ed1
                                                            • Opcode Fuzzy Hash: 6b5f59acbbd9afa53e9bd9a175e84d83a18c58b80a4b24e476d01ab99afccbc3
                                                            • Instruction Fuzzy Hash: 6EC1D274E05228CFDB54CFA9C8447EEBBF2BF89300F1496AAD408A7265DB319985CF50
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 19c5ef8355382f622aa8bc9884b5b700e87cdb55bafb6b8d31befae9c61e2838
                                                            • Instruction ID: f1d359cde82616a826be0df53ac6b95dbbbd8e3a6cfaaf99eea41e7bbcd37945
                                                            • Opcode Fuzzy Hash: 19c5ef8355382f622aa8bc9884b5b700e87cdb55bafb6b8d31befae9c61e2838
                                                            • Instruction Fuzzy Hash: ABC1D1B4E05228CFDB54CFA9C8447AEBBF2BF89300F14D5AAD408A7265DB759985CF40
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2265079723.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_15a0000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 035940ceb99db727d4a5186e104d9f08ae2add72ea193437036c97c92254f245
                                                            • Instruction ID: a9a361a82ad148c1eb859ecbfa32289b0b5b75bfc87b432ffb8bc99737e67be2
                                                            • Opcode Fuzzy Hash: 035940ceb99db727d4a5186e104d9f08ae2add72ea193437036c97c92254f245
                                                            • Instruction Fuzzy Hash: 5E819074E01219DFDB54DFA9D984AADBBF2FF88300F208129E519AB365EB706945CF40
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2265079723.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_15a0000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 46902def0e80c53f2565503a132ae8e8df603a4fe3c75564024627df39ce98ec
                                                            • Instruction ID: 7ab3c50988577268616846a33cdad027f0c2def3a72d5dcaedb82c38418eafbb
                                                            • Opcode Fuzzy Hash: 46902def0e80c53f2565503a132ae8e8df603a4fe3c75564024627df39ce98ec
                                                            • Instruction Fuzzy Hash: 7981A174E01219DFDB14DFA9D984AADBBF2FF88300F208529E519AB355EB706945CF40
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f5ffd456404e0e964c86ec0eaaf35ba604a0500a96bb8cf25a1921da78fc9675
                                                            • Instruction ID: ae39b866955b916b923090e05cd23a8f7c89a114a26f24a0473a7ae8e6bea4db
                                                            • Opcode Fuzzy Hash: f5ffd456404e0e964c86ec0eaaf35ba604a0500a96bb8cf25a1921da78fc9675
                                                            • Instruction Fuzzy Hash: E2211AB0D156588BEB18CF67C9443EEBBF7AFC9300F14C46AD409B6264DB7409468B50
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 360f23c8f50ba142cfc8c8391cff5e0a445250e2bf2f98a4decd67d5cb13c80e
                                                            • Instruction ID: eaf422448d46d3008526b26a46fdea52532e607927dd98b4dc77fa452d68d9ed
                                                            • Opcode Fuzzy Hash: 360f23c8f50ba142cfc8c8391cff5e0a445250e2bf2f98a4decd67d5cb13c80e
                                                            • Instruction Fuzzy Hash: 562108B0E056588BEB18CFABC9443EEFAF7AFC9340F14C46AD40976254DB7009468F90

                                                            Control-flow Graph

                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 015AD3F6
                                                            • GetCurrentThread.KERNEL32 ref: 015AD433
                                                            • GetCurrentProcess.KERNEL32 ref: 015AD470
                                                            • GetCurrentThreadId.KERNEL32 ref: 015AD4C9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2265079723.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_15a0000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 7b41cbce8cb9ce157425eba8893da516d35bacda37f2e7cf805d2a9034564f9f
                                                            • Instruction ID: 6bffc75df349aea1092b81c30f1e7dce3aac81ebf8a18a3c9d213758500b5d26
                                                            • Opcode Fuzzy Hash: 7b41cbce8cb9ce157425eba8893da516d35bacda37f2e7cf805d2a9034564f9f
                                                            • Instruction Fuzzy Hash: 005148B090034A8FEB54DFA9D548BDEBFF1FF88314F208459E009A7260DB746944CB66

                                                            Control-flow Graph

                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 015AD3F6
                                                            • GetCurrentThread.KERNEL32 ref: 015AD433
                                                            • GetCurrentProcess.KERNEL32 ref: 015AD470
                                                            • GetCurrentThreadId.KERNEL32 ref: 015AD4C9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2265079723.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_15a0000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: f00d2333a50b0bcf470070f9687dc2f268ef4ea324541ecca1da99cc33b2fdbb
                                                            • Instruction ID: b05d57a8f5a4e1112a89df046f082fbdcd1b1ee939b53bc7f0678f50cb558e62
                                                            • Opcode Fuzzy Hash: f00d2333a50b0bcf470070f9687dc2f268ef4ea324541ecca1da99cc33b2fdbb
                                                            • Instruction Fuzzy Hash: 875139B090034A8FEB54DFA9D548BDEBFF1FF88314F208459E419A7260DBB46944CB66

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 44 901fb8a-901fc25 46 901fc27-901fc31 44->46 47 901fc5e-901fc7e 44->47 46->47 48 901fc33-901fc35 46->48 54 901fc80-901fc8a 47->54 55 901fcb7-901fce6 47->55 49 901fc37-901fc41 48->49 50 901fc58-901fc5b 48->50 52 901fc43 49->52 53 901fc45-901fc54 49->53 50->47 52->53 53->53 56 901fc56 53->56 54->55 57 901fc8c-901fc8e 54->57 61 901fce8-901fcf2 55->61 62 901fd1f-901fdd9 CreateProcessA 55->62 56->50 59 901fcb1-901fcb4 57->59 60 901fc90-901fc9a 57->60 59->55 63 901fc9c 60->63 64 901fc9e-901fcad 60->64 61->62 66 901fcf4-901fcf6 61->66 75 901fde2-901fe68 62->75 76 901fddb-901fde1 62->76 63->64 64->64 65 901fcaf 64->65 65->59 67 901fd19-901fd1c 66->67 68 901fcf8-901fd02 66->68 67->62 70 901fd04 68->70 71 901fd06-901fd15 68->71 70->71 71->71 73 901fd17 71->73 73->67 86 901fe78-901fe7c 75->86 87 901fe6a-901fe6e 75->87 76->75 89 901fe8c-901fe90 86->89 90 901fe7e-901fe82 86->90 87->86 88 901fe70 87->88 88->86 92 901fea0-901fea4 89->92 93 901fe92-901fe96 89->93 90->89 91 901fe84 90->91 91->89 95 901feb6-901febd 92->95 96 901fea6-901feac 92->96 93->92 94 901fe98 93->94 94->92 97 901fed4 95->97 98 901febf-901fece 95->98 96->95 100 901fed5 97->100 98->97 100->100
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0901FDC6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 522b89b68f1faaa396dd8d39517c9a14ec1436fb66148184c77113df21ef24db
                                                            • Instruction ID: 2876bebc4957cec06ce0f5524408ec7f627dbbd872fdce9f48963ac498025fd7
                                                            • Opcode Fuzzy Hash: 522b89b68f1faaa396dd8d39517c9a14ec1436fb66148184c77113df21ef24db
                                                            • Instruction Fuzzy Hash: 01913871D0025ACFEF24CFA8C941BADBBF2FB48314F148969E908A7250DB749985CF91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 101 901fb90-901fc25 103 901fc27-901fc31 101->103 104 901fc5e-901fc7e 101->104 103->104 105 901fc33-901fc35 103->105 111 901fc80-901fc8a 104->111 112 901fcb7-901fce6 104->112 106 901fc37-901fc41 105->106 107 901fc58-901fc5b 105->107 109 901fc43 106->109 110 901fc45-901fc54 106->110 107->104 109->110 110->110 113 901fc56 110->113 111->112 114 901fc8c-901fc8e 111->114 118 901fce8-901fcf2 112->118 119 901fd1f-901fdd9 CreateProcessA 112->119 113->107 116 901fcb1-901fcb4 114->116 117 901fc90-901fc9a 114->117 116->112 120 901fc9c 117->120 121 901fc9e-901fcad 117->121 118->119 123 901fcf4-901fcf6 118->123 132 901fde2-901fe68 119->132 133 901fddb-901fde1 119->133 120->121 121->121 122 901fcaf 121->122 122->116 124 901fd19-901fd1c 123->124 125 901fcf8-901fd02 123->125 124->119 127 901fd04 125->127 128 901fd06-901fd15 125->128 127->128 128->128 130 901fd17 128->130 130->124 143 901fe78-901fe7c 132->143 144 901fe6a-901fe6e 132->144 133->132 146 901fe8c-901fe90 143->146 147 901fe7e-901fe82 143->147 144->143 145 901fe70 144->145 145->143 149 901fea0-901fea4 146->149 150 901fe92-901fe96 146->150 147->146 148 901fe84 147->148 148->146 152 901feb6-901febd 149->152 153 901fea6-901feac 149->153 150->149 151 901fe98 150->151 151->149 154 901fed4 152->154 155 901febf-901fece 152->155 153->152 157 901fed5 154->157 155->154 157->157
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0901FDC6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 98c857d71157049aef5d4f435e76efc76539467d8c2ac894c0c84e51881ee64a
                                                            • Instruction ID: 472d51a7d05aae1a7296a10de529273bd2f1f577d4fa662f55fc769832961adb
                                                            • Opcode Fuzzy Hash: 98c857d71157049aef5d4f435e76efc76539467d8c2ac894c0c84e51881ee64a
                                                            • Instruction Fuzzy Hash: 46913971D0025ACFEF24CF68C941BADBAF2FF48310F148969E908A7250DB749985CF91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 158 15ab3b1-15ab3df 159 15ab40b-15ab40f 158->159 160 15ab3e1-15ab3ee call 15a9f4c 158->160 162 15ab423-15ab464 159->162 163 15ab411-15ab41b 159->163 165 15ab3f0 160->165 166 15ab404 160->166 169 15ab471-15ab47f 162->169 170 15ab466-15ab46e 162->170 163->162 213 15ab3f6 call 15ab668 165->213 214 15ab3f6 call 15ab659 165->214 166->159 171 15ab4a3-15ab4a5 169->171 172 15ab481-15ab486 169->172 170->169 177 15ab4a8-15ab4af 171->177 174 15ab488-15ab48f call 15a9f58 172->174 175 15ab491 172->175 173 15ab3fc-15ab3fe 173->166 176 15ab540-15ab600 173->176 179 15ab493-15ab4a1 174->179 175->179 208 15ab608-15ab633 GetModuleHandleW 176->208 209 15ab602-15ab605 176->209 180 15ab4bc-15ab4c3 177->180 181 15ab4b1-15ab4b9 177->181 179->177 183 15ab4d0-15ab4d9 call 15a9f68 180->183 184 15ab4c5-15ab4cd 180->184 181->180 189 15ab4db-15ab4e3 183->189 190 15ab4e6-15ab4eb 183->190 184->183 189->190 191 15ab509-15ab516 190->191 192 15ab4ed-15ab4f4 190->192 199 15ab518-15ab536 191->199 200 15ab539-15ab53f 191->200 192->191 194 15ab4f6-15ab506 call 15a9f78 call 15aafbc 192->194 194->191 199->200 210 15ab63c-15ab650 208->210 211 15ab635-15ab63b 208->211 209->208 211->210 213->173 214->173
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 015AB626
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2265079723.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_15a0000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: d777e02997881322e693f3366cae0728dd54cdd725d84c713dad3bbe105ef05a
                                                            • Instruction ID: 7677d575a91286c59c9284355000e33aecc72d51a5118f96c0e05f25d85f7bae
                                                            • Opcode Fuzzy Hash: d777e02997881322e693f3366cae0728dd54cdd725d84c713dad3bbe105ef05a
                                                            • Instruction Fuzzy Hash: 028146B0A00B068FD765DF29D44479EBBF1FF88204F008A2ED58ADBA51E774E845CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 215 15a590c-15a59d9 CreateActCtxA 217 15a59db-15a59e1 215->217 218 15a59e2-15a5a3c 215->218 217->218 225 15a5a4b-15a5a4f 218->225 226 15a5a3e-15a5a41 218->226 227 15a5a60 225->227 228 15a5a51-15a5a5d 225->228 226->225 230 15a5a61 227->230 228->227 230->230
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 015A59C9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2265079723.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_15a0000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 58cfbb7418b2475908ff38eae441394402d8161734e8f92c83c6b3044185a4a0
                                                            • Instruction ID: bf5be9c3b03f24923368fa7a62cafac787561b62264b1affbb28e58b92000dae
                                                            • Opcode Fuzzy Hash: 58cfbb7418b2475908ff38eae441394402d8161734e8f92c83c6b3044185a4a0
                                                            • Instruction Fuzzy Hash: 4041EFB1D0071DCBDB24CFA9C984BDEBBB5BF48704F60816AD408AB251DBB16945CF90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 231 15a44f0-15a59d9 CreateActCtxA 234 15a59db-15a59e1 231->234 235 15a59e2-15a5a3c 231->235 234->235 242 15a5a4b-15a5a4f 235->242 243 15a5a3e-15a5a41 235->243 244 15a5a60 242->244 245 15a5a51-15a5a5d 242->245 243->242 247 15a5a61 244->247 245->244 247->247
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 015A59C9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2265079723.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_15a0000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 62bb362ad53fdd78a175e16428942adaeb4f3e126103d820b70ef3347bd8bc97
                                                            • Instruction ID: 2722d80c96957f4ceda8c9d37c242991e14b653c706cd039df67e21c7f686065
                                                            • Opcode Fuzzy Hash: 62bb362ad53fdd78a175e16428942adaeb4f3e126103d820b70ef3347bd8bc97
                                                            • Instruction Fuzzy Hash: 5241EFB0D0071DCBDB24CFA9C984BDEBBB5BF49704F60806AD508AB251DBB16945CF91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 248 901f900-901f956 251 901f966-901f9a5 WriteProcessMemory 248->251 252 901f958-901f964 248->252 254 901f9a7-901f9ad 251->254 255 901f9ae-901f9de 251->255 252->251 254->255
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0901F998
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: 48d9d7b0fa7ce160855fd5f365c55f20688ca5fa844f9eb42bdc93cc028503bd
                                                            • Instruction ID: 7b9fac3bdd8aaaec7bf32c5ae04a15a051f2a2f1165b7284998c9665ccdbdec1
                                                            • Opcode Fuzzy Hash: 48d9d7b0fa7ce160855fd5f365c55f20688ca5fa844f9eb42bdc93cc028503bd
                                                            • Instruction Fuzzy Hash: 9E2126B190034A9FDF10DFA9C985BDEBBF1FF48314F108829EA19A7240D7789954CBA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 259 901f908-901f956 261 901f966-901f9a5 WriteProcessMemory 259->261 262 901f958-901f964 259->262 264 901f9a7-901f9ad 261->264 265 901f9ae-901f9de 261->265 262->261 264->265
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0901F998
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: 2b122c37208654b5cb8daf765224af9ab64cee8aa7bf133f233b5fd8ef4e018b
                                                            • Instruction ID: 73bd683703a107003a0dd36534ddf84bf8b5a27bc8d9df7675da9c840ecd9649
                                                            • Opcode Fuzzy Hash: 2b122c37208654b5cb8daf765224af9ab64cee8aa7bf133f233b5fd8ef4e018b
                                                            • Instruction Fuzzy Hash: C62126B190034A9FDF10DFAAC985BDEBBF5FF48310F108829E918A7240D7789954CBA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 269 901f9f0-901fa85 ReadProcessMemory 272 901fa87-901fa8d 269->272 273 901fa8e-901fabe 269->273 272->273
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0901FA78
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: 5120cce9fdba2f229a151ac46dbe4acf708eeb2dd664d29fe3bb8eb429348a84
                                                            • Instruction ID: 4a0eeb1e78243b5cc297334fd8181e4a52c61689c3ca8b72b8e9b018db616763
                                                            • Opcode Fuzzy Hash: 5120cce9fdba2f229a151ac46dbe4acf708eeb2dd664d29fe3bb8eb429348a84
                                                            • Instruction Fuzzy Hash: D22148B18003499FDF10DFAAC881BEEBBF1FF48310F10842AE618A7240C7789511CBA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 277 901f330-901f383 279 901f393-901f3c3 Wow64SetThreadContext 277->279 280 901f385-901f391 277->280 282 901f3c5-901f3cb 279->282 283 901f3cc-901f3fc 279->283 280->279 282->283
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0901F3B6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: bd44c66d0a1e9b87bb154d1d2a8872073999f6700fb48462b1f9dbbcd400df47
                                                            • Instruction ID: 0f90ae3e1e2202379ab0813141dd9d7722e097e74c2e5769ec997cf1bb774803
                                                            • Opcode Fuzzy Hash: bd44c66d0a1e9b87bb154d1d2a8872073999f6700fb48462b1f9dbbcd400df47
                                                            • Instruction Fuzzy Hash: CA214CB1D003098FDB10DFAAC4857EEBBF4EF88314F14842AD519A7240D7789945CFA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 297 901f9f8-901fa85 ReadProcessMemory 300 901fa87-901fa8d 297->300 301 901fa8e-901fabe 297->301 300->301
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0901FA78
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: c6d816ba0acd5f161ee7412426692b5aad4a358e3590b9b29b40ff82490629e9
                                                            • Instruction ID: f3edcaaf3eaa4cdd6a63bc6b768f45d5a290c5110942ec1490a4d8560489ce92
                                                            • Opcode Fuzzy Hash: c6d816ba0acd5f161ee7412426692b5aad4a358e3590b9b29b40ff82490629e9
                                                            • Instruction Fuzzy Hash: 942128B19003499FDB10DFAAC881BEEBBF5FF48310F508429E518A7250C7799550CBA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 287 901f338-901f383 289 901f393-901f3c3 Wow64SetThreadContext 287->289 290 901f385-901f391 287->290 292 901f3c5-901f3cb 289->292 293 901f3cc-901f3fc 289->293 290->289 292->293
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0901F3B6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: e1fcd17f731a57fb58623f0ef916644783e9b7bc4235e1887ae60b3d3d805422
                                                            • Instruction ID: 94ea6d78c60b5a06bd0f0384001cbd79261cf244b1f615e7236e8c3ca7c3c0d6
                                                            • Opcode Fuzzy Hash: e1fcd17f731a57fb58623f0ef916644783e9b7bc4235e1887ae60b3d3d805422
                                                            • Instruction Fuzzy Hash: 92212C71D003098FDB10DFAAC4857EEBBF4EF48314F14842AD559A7241D7789544CFA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 310 15ad9c8-15ada5c DuplicateHandle 311 15ada5e-15ada64 310->311 312 15ada65-15ada82 310->312 311->312
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 015ADA4F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2265079723.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_15a0000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 6de7a37d73d9c560b8a9bccc819ff07900bbf491a7c083742500ebb5735d1654
                                                            • Instruction ID: 37f636a827377739465a031baa13299e46e613c18679b9c7b18911b1a0e769c5
                                                            • Opcode Fuzzy Hash: 6de7a37d73d9c560b8a9bccc819ff07900bbf491a7c083742500ebb5735d1654
                                                            • Instruction Fuzzy Hash: 5321C4B5900249DFDB10CF9AD984ADEBFF4FB48320F14841AE918A7350D375A954CF65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 305 15ad9c1-15ada5c DuplicateHandle 306 15ada5e-15ada64 305->306 307 15ada65-15ada82 305->307 306->307
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 015ADA4F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2265079723.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_15a0000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: dfe242e450dae7d82ec3d913435dc9f32afedfb85453b6c7e1444af3a8ebe9ce
                                                            • Instruction ID: 85d9b89c54bdd50124fca1b29709a071d9c3f5d0a6f37e878b2e0e21d32d056c
                                                            • Opcode Fuzzy Hash: dfe242e450dae7d82ec3d913435dc9f32afedfb85453b6c7e1444af3a8ebe9ce
                                                            • Instruction Fuzzy Hash: FE21E2B5D00209DFDB10CFA9D984AEEBBF4FB48324F14841AE918A7350D378A954CF61
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0901F8B6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 65a3940f246b74d38cf35d3e46ada0b13b479f47fb55bc1031dfa3b52f0512d2
                                                            • Instruction ID: 892be0759cfa6790f7304bff1ae81a974e349a497fd82883f6f7e96f90352f08
                                                            • Opcode Fuzzy Hash: 65a3940f246b74d38cf35d3e46ada0b13b479f47fb55bc1031dfa3b52f0512d2
                                                            • Instruction Fuzzy Hash: 3711567290024A9FDB20DFAAC845BDFBBF5EF88320F10881AE519A7250C7759951CBA1
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0901F8B6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 364649848b313aeb76b843da9ac4a052e1f650bcb0517d3edbd472dde6658dfb
                                                            • Instruction ID: c5050aa777bab705de348d37b0c9e5a133b993c6daf01b8149450c05b04a754b
                                                            • Opcode Fuzzy Hash: 364649848b313aeb76b843da9ac4a052e1f650bcb0517d3edbd472dde6658dfb
                                                            • Instruction Fuzzy Hash: 8811567290024A9FDB10DFAAC844BDEBBF5EF88320F10881AE519A7250C775A550CBA1
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: b90665f1e6f5e7b275b7c82130d3de0694f648cd8b2413954965bf8a8d2e55b9
                                                            • Instruction ID: 0b2a468b43e669fca85a628d97deb6e521203096955dfcd42727b58b80533326
                                                            • Opcode Fuzzy Hash: b90665f1e6f5e7b275b7c82130d3de0694f648cd8b2413954965bf8a8d2e55b9
                                                            • Instruction Fuzzy Hash: 5C116AB1D003498FDB20DFAAC8457DEFBF4EF88724F208819D519A7240CB79A545CBA5
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: df0902db0b5d8d96f8f7d3799f8e1e662d368c1696c6983b13ecf6259bd5782f
                                                            • Instruction ID: 29326f181b3fd8f8c5cbe5d292a703df1ecd491b37b5874bb504c656c2f71d8b
                                                            • Opcode Fuzzy Hash: df0902db0b5d8d96f8f7d3799f8e1e662d368c1696c6983b13ecf6259bd5782f
                                                            • Instruction Fuzzy Hash: 81113AB19003498FDB10DFAAC8457DEFBF4EF88724F248819D519A7240CB75A544CBA5
                                                            APIs
                                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 04F62475
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2291861247.0000000004F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f60000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: 2fd9fc0580a00b1dd942d9f378af5d3307108aad80b8637c59b28b34ae3b75cd
                                                            • Instruction ID: f293da51c6b0bf172a18e2b2c6fd8a57f40e315575e89c13f502c42fab68ae13
                                                            • Opcode Fuzzy Hash: 2fd9fc0580a00b1dd942d9f378af5d3307108aad80b8637c59b28b34ae3b75cd
                                                            • Instruction Fuzzy Hash: 8B1133B5800349CFDB10CF9AC485BDEBBF4FB48320F10841AD968A7200C375A955CFA1
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 015AB626
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2265079723.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_15a0000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 6d7c5c92bc0ed101caf29e4464c0209cb29c4d8471decdfc78b592ca1d98ee76
                                                            • Instruction ID: f3ce394042ab5d267ecf75f889e2f94be311eb9302ec6b3c5bb8000190a986b0
                                                            • Opcode Fuzzy Hash: 6d7c5c92bc0ed101caf29e4464c0209cb29c4d8471decdfc78b592ca1d98ee76
                                                            • Instruction Fuzzy Hash: C3110FB6C003498FDB10CF9AC844ADEFBF4AF88224F14841AD528A7600C379A545CFA1
                                                            APIs
                                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 04F62475
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2291861247.0000000004F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f60000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: c9164d1b82d698eed0ced7c8c7e236817896cb12893c0bc3e6b306be779091a1
                                                            • Instruction ID: 85bdc96e38f071ac3dca527d113603fe5b5a23fc37ca993284eefbcc34ab9e56
                                                            • Opcode Fuzzy Hash: c9164d1b82d698eed0ced7c8c7e236817896cb12893c0bc3e6b306be779091a1
                                                            • Instruction Fuzzy Hash: D61136B5800349DFDB10DF99C444BEFBBF8EB48320F10845AE919A7201D374A954CFA1
                                                            APIs
                                                            • CloseHandle.KERNELBASE(?), ref: 090101C8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle
                                                            • String ID:
                                                            • API String ID: 2962429428-0
                                                            • Opcode ID: 323f17158eb0a46e582c91cec3d9ecaa0680b8e7ea5a6c8cb7a3ea20ec2b023b
                                                            • Instruction ID: 20913f1dfde6cacb1c0d4cee6841f16830ae6f7be22947f60cca090aa7cd4eee
                                                            • Opcode Fuzzy Hash: 323f17158eb0a46e582c91cec3d9ecaa0680b8e7ea5a6c8cb7a3ea20ec2b023b
                                                            • Instruction Fuzzy Hash: E11136B5800249CFDB10CF9AC644BEEBBF4EF48320F10881AD958A7640D778A594CFA1
                                                            APIs
                                                            • CloseHandle.KERNELBASE(?), ref: 090101C8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle
                                                            • String ID:
                                                            • API String ID: 2962429428-0
                                                            • Opcode ID: 8e8d95bfca7df4eeee0980ef2dc6fcc8cf0df41446a241960448853485052712
                                                            • Instruction ID: 963c74b3758f8d30084cd26fb9fb4ef1dc85972cd3e3cb9926b55f1f20926fec
                                                            • Opcode Fuzzy Hash: 8e8d95bfca7df4eeee0980ef2dc6fcc8cf0df41446a241960448853485052712
                                                            • Instruction Fuzzy Hash: 1D1103B6800349CFDB10DF9AC545BEEBBF4EB48324F20881AD958A7640D778A594CFA5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2263955323.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_154d000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1ea3529c697258010b8bde8e4d2f539b26242be0fe5988ab4fa6c77350dcd0b7
                                                            • Instruction ID: be1df80a6920bfd5450aac978e32bb93601b24967fa17e66ff71ab857c9d4358
                                                            • Opcode Fuzzy Hash: 1ea3529c697258010b8bde8e4d2f539b26242be0fe5988ab4fa6c77350dcd0b7
                                                            • Instruction Fuzzy Hash: 73214876500204DFDB05DF54D9C0B6ABFB5FB94328F20C56CE9090F256C3BAE456CAA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2263955323.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_154d000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f44993eef5445c8cfd6363fe059764c466c39008c41bbe7027e4251561de5480
                                                            • Instruction ID: 01b63b609e0b0e40fbb0c0d3f11517d239d0877625da1d868c7b3aadd51df48e
                                                            • Opcode Fuzzy Hash: f44993eef5445c8cfd6363fe059764c466c39008c41bbe7027e4251561de5480
                                                            • Instruction Fuzzy Hash: EB212172600240EFDB05DF54D9C0B6ABFB1FB9831CF208569E9090F256C736D416CAA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2264127359.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_155d000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: daee93cda3a6a47c688c2797b7613de03d8f9f21941cd5317ddf0af12da8ed5a
                                                            • Instruction ID: 2736637391195e9fcba26e67e9c7bbc900c7d82d116a7c3ada6ac807003aed8d
                                                            • Opcode Fuzzy Hash: daee93cda3a6a47c688c2797b7613de03d8f9f21941cd5317ddf0af12da8ed5a
                                                            • Instruction Fuzzy Hash: B3210072504200EFDB45DF94D9D0B2ABBB1FB84324F20C96EED0A4F252C77AD446CA61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2264127359.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_155d000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 131e8200e2f8859d76949cb80094b3d04a8e51ff02ba827856bf00d5e9ff02e6
                                                            • Instruction ID: cb8bfc4a8395f1b7a87b21635820d7e9d1d245d50a7b9f47014e74c0a53c0d2a
                                                            • Opcode Fuzzy Hash: 131e8200e2f8859d76949cb80094b3d04a8e51ff02ba827856bf00d5e9ff02e6
                                                            • Instruction Fuzzy Hash: DE21FF76604204EFDB55DF54D990B2ABBA1FB84314F20C96EDD0A4F262D37AD406CA61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2264127359.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_155d000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5e652a1a3cc4af266635d93acdea5bf5b95b27b93dd280fec087367e373df091
                                                            • Instruction ID: 0c56c2094f64cd076fb3cfb46c1898b8cb46f964166efc6526c3945f82960a98
                                                            • Opcode Fuzzy Hash: 5e652a1a3cc4af266635d93acdea5bf5b95b27b93dd280fec087367e373df091
                                                            • Instruction Fuzzy Hash: 532180765083849FDB02CF64D994B15BF71FB46214F28C5EAD8498F2A7D33AD806CB62
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2263955323.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_154d000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                            • Instruction ID: 6a5cd4eb0ded3ba2bfd51a0e40e391bdb51468cd3140dc4db7ae3c8fb864af62
                                                            • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                            • Instruction Fuzzy Hash: 2311CDB6404280CFCB02CF54D5C4B5ABF71FB94228F2482A9D8090A256C37AE456CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2263955323.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_154d000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                            • Instruction ID: af81c0a2be1f2edbbaf12def133575797616853eb07358a1ef9976e7b839f76c
                                                            • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                            • Instruction Fuzzy Hash: A211DF76504280CFCB02CF54D5C0B5ABF71FB94318F24C6A9D8090F256C33AD456CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2264127359.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_155d000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                            • Instruction ID: 39d69b677ebfdb9f22b9b5bd0e1554136b8bac21df02d86d347fea0b969da75c
                                                            • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                            • Instruction Fuzzy Hash: 7611BB76504280DFCB42CF54C5D0B19BBB1FB84224F24C6AEDC494F6A6C33AD44ACB61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2263955323.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_154d000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: db4e86bbc733d4944ebf40af8009f2325a359754a0cf80294b1dc58dd60cb6eb
                                                            • Instruction ID: c9f5c1d7a2e13b188404cfc3f071a392852de901f08dad2a76b264865db39abf
                                                            • Opcode Fuzzy Hash: db4e86bbc733d4944ebf40af8009f2325a359754a0cf80294b1dc58dd60cb6eb
                                                            • Instruction Fuzzy Hash: 1901F7710043849BF7108FA9CD84B6ABFE8EF51228F08C91AEE084E282C6799440C671
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2263955323.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_154d000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4a154bd1df4f13c4610a6e69982c093e9b07196bfe365e0cbd644a5a3dc3cfda
                                                            • Instruction ID: db1e1251164687c28d2bc4ad2e8c838f42dba8ee045dc0c610c978f159b72758
                                                            • Opcode Fuzzy Hash: 4a154bd1df4f13c4610a6e69982c093e9b07196bfe365e0cbd644a5a3dc3cfda
                                                            • Instruction Fuzzy Hash: 59F062724053849FE7118E59DD88B66FFA8EB91638F18C45AED084E287C279A844CBB1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Yyn_
                                                            • API String ID: 0-3435906727
                                                            • Opcode ID: 7b42457a9a525a16f0bf3f94317029a8bf8dbe9c847b19fa837b486351e3d470
                                                            • Instruction ID: e7de832541e95b3f19f7329a4e2e0cd34fb27b2f599c5d749f0df81e5d741aab
                                                            • Opcode Fuzzy Hash: 7b42457a9a525a16f0bf3f94317029a8bf8dbe9c847b19fa837b486351e3d470
                                                            • Instruction Fuzzy Hash: 6AE11974E002698FDB14DF99C580AAEBBF2FF89304F248669D415AB355D730AD42CF61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2291861247.0000000004F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f60000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: acca1db6ef1bc9733c7c9c2ea9e19d0d87031bbeab66f6a4f9156de5f2751ae8
                                                            • Instruction ID: f03c090d9c09465527980061d4eadc1f2b2634e59f4315733a1455d58f0010a6
                                                            • Opcode Fuzzy Hash: acca1db6ef1bc9733c7c9c2ea9e19d0d87031bbeab66f6a4f9156de5f2751ae8
                                                            • Instruction Fuzzy Hash: 2AD1DC30B016118FEB29EF75C460BAFBBF6AF89304F1484A9C5469B391DB35E902CB55
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d9ae13a7578aabff34a77b09e1b0e6ca551cc6c4e5a4f2e828e0b14c62f7ae92
                                                            • Instruction ID: b46bb5eed7e054dcc101d8d83e36fce8bbade098223f27018a3e422f76fd0af0
                                                            • Opcode Fuzzy Hash: d9ae13a7578aabff34a77b09e1b0e6ca551cc6c4e5a4f2e828e0b14c62f7ae92
                                                            • Instruction Fuzzy Hash: C4E14974E002698FDB14CFA9C580AAEBBF2FF89304F248269D445AB355D770AD42CF61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 94ab61c0b8a1cb3154b962a54714cbc87278ca6e02127af6bcef27df4f4fdf86
                                                            • Instruction ID: d7d755a46b4b99d888837fe2e13e12938c4cbfb2fd4f5133ae78f7614da60d15
                                                            • Opcode Fuzzy Hash: 94ab61c0b8a1cb3154b962a54714cbc87278ca6e02127af6bcef27df4f4fdf86
                                                            • Instruction Fuzzy Hash: 83E10974E002698FDB14DF99C580AAEFBF2FF88304F248669D815AB355D770A942CF61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6b931e1bdca02e569c470466862dc4b200a015b1443d83ab74e5f5467da5e50b
                                                            • Instruction ID: 4a2185d574bc2e47f21ced7d194c33edc31205e0f55fe8f877b30cd50b54f6cc
                                                            • Opcode Fuzzy Hash: 6b931e1bdca02e569c470466862dc4b200a015b1443d83ab74e5f5467da5e50b
                                                            • Instruction Fuzzy Hash: 28E10974E002698FDB14DFA9C580AAEBBF2FF88304F248669D419A7355D770AD42CF61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a7133b3e8a51ea65f6bace8d7264947a987a20751ec191b52b03b58e623b4010
                                                            • Instruction ID: fbc64c59c3e83edcad518104849925dc837f3e76ddeb3081624055c8dc6e14b4
                                                            • Opcode Fuzzy Hash: a7133b3e8a51ea65f6bace8d7264947a987a20751ec191b52b03b58e623b4010
                                                            • Instruction Fuzzy Hash: 38E11874E0021A8FDB14DFA9C580AAEBBF2FF88304F248669D515AB355D770AD42CF61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2265079723.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_15a0000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: aea10e43a89dff4a5d015c0ee348e6e1800a081b78e21dc3de1a48f4d4b10e86
                                                            • Instruction ID: e78a491795f93b65c3b700dc8b18ee5de0311445b38d5834014aa80884310ea3
                                                            • Opcode Fuzzy Hash: aea10e43a89dff4a5d015c0ee348e6e1800a081b78e21dc3de1a48f4d4b10e86
                                                            • Instruction Fuzzy Hash: 26A17F32E4021A8FCF15DFB4C8805EEBBB2FF85300B55856AE905AF265DB71E946CB40
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1dcb39cdef61edab1363657c8ffa517cec136d92d81be96bcf674f24b1e7211e
                                                            • Instruction ID: f890eb50cadb42d07687ecbc27006c3bb3fadebbf067b3282b70cd5a06a5ff3c
                                                            • Opcode Fuzzy Hash: 1dcb39cdef61edab1363657c8ffa517cec136d92d81be96bcf674f24b1e7211e
                                                            • Instruction Fuzzy Hash: EE91EFB0D05218DFDB14CFA9D884BEDBBF6BF89300F10986AE419AB261DB744985DF40
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c0c76dc914c7cb7b46f972446e41bb201549c05d58b61a2532d5128dded34cd4
                                                            • Instruction ID: 8b026802b5579479e43e1184e03db5f32e433271985900bb21c227e96ebc89c4
                                                            • Opcode Fuzzy Hash: c0c76dc914c7cb7b46f972446e41bb201549c05d58b61a2532d5128dded34cd4
                                                            • Instruction Fuzzy Hash: F191DEB0D05218DFDB14CFA9D8847EDBBB2BF89304F10946AE419AB261DB744986DF50
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 32f5b3dc286dfabd578ea0f1e2d1a8dc09f339e4a017505d3c49725b4623c572
                                                            • Instruction ID: 2cb05f5d3f4a4c6f3622721697fe0fbf070b8d5dcb14a7c82c50a0fae9279f03
                                                            • Opcode Fuzzy Hash: 32f5b3dc286dfabd578ea0f1e2d1a8dc09f339e4a017505d3c49725b4623c572
                                                            • Instruction Fuzzy Hash: A871097091121ACFDB48EF6AE84169E7FF2FBC8304F14C56AD105AB268EFB45809DB40
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 320970ac42fbf6de65c9ba831ae94777739382123004566a6982d2e92dc7fe41
                                                            • Instruction ID: a5155bc9a4bf8bce0b08c80d230b261304e22fdbe8c22d50f936f295f6d7e937
                                                            • Opcode Fuzzy Hash: 320970ac42fbf6de65c9ba831ae94777739382123004566a6982d2e92dc7fe41
                                                            • Instruction Fuzzy Hash: B361E9709112168FDB48EF6AE84169A7FF2FBC8304F14C56AD105AB268EEB458099B50
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3fe0c30119e2c0fe6654301d91652063b22f165c74ad228244590b65ec8a9565
                                                            • Instruction ID: 0d2cc947993306253345eeebc3046fa64c30f38a9b40fe40d7e8fed0006d614b
                                                            • Opcode Fuzzy Hash: 3fe0c30119e2c0fe6654301d91652063b22f165c74ad228244590b65ec8a9565
                                                            • Instruction Fuzzy Hash: 5451E374E09219CFCF04CFAAD4849EEBBFABF89350F149869E519A7219D7309A41CF50
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2304895426.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_9010000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2bce01126d0a071fae0ec715d2637dee26dac37cb1bc46a8e7902d199bf83f5f
                                                            • Instruction ID: 6976702f911981795ce949741bda09bedb8550573cac0a8b896e036f778e63b2
                                                            • Opcode Fuzzy Hash: 2bce01126d0a071fae0ec715d2637dee26dac37cb1bc46a8e7902d199bf83f5f
                                                            • Instruction Fuzzy Hash: 3351F975E002698FDB14CFA9C5805AEFBF2FF89304F24866AD458A7355D7309A42CFA1

                                                            Execution Graph

                                                            Execution Coverage:6.4%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:83
                                                            Total number of Limit Nodes:9
                                                            execution_graph 15285 3284668 15286 3284676 15285->15286 15291 3286de0 15286->15291 15289 3284704 15292 3286e05 15291->15292 15300 3286edf 15292->15300 15304 3286ef0 15292->15304 15293 32846e9 15296 328421c 15293->15296 15297 3284227 15296->15297 15312 3288560 15297->15312 15299 3288806 15299->15289 15302 3286f17 15300->15302 15301 3286ff4 15301->15301 15302->15301 15308 3286414 15302->15308 15306 3286f17 15304->15306 15305 3286ff4 15305->15305 15306->15305 15307 3286414 CreateActCtxA 15306->15307 15307->15305 15309 3287370 CreateActCtxA 15308->15309 15311 3287433 15309->15311 15313 328856b 15312->15313 15316 3288580 15313->15316 15315 32888dd 15315->15299 15317 328858b 15316->15317 15320 32885b0 15317->15320 15319 32889ba 15319->15315 15321 32885bb 15320->15321 15324 32885e0 15321->15324 15323 3288aad 15323->15319 15325 32885eb 15324->15325 15326 3289e93 15325->15326 15328 328bed1 15325->15328 15326->15323 15329 328beda 15328->15329 15331 328be91 15328->15331 15334 328bf08 15329->15334 15337 328bef8 15329->15337 15330 328bee6 15330->15326 15331->15326 15340 328bff0 15334->15340 15335 328bf17 15335->15330 15338 328bf17 15337->15338 15339 328bff0 GetModuleHandleW 15337->15339 15338->15330 15339->15338 15341 328c034 15340->15341 15343 328c011 15340->15343 15341->15335 15342 328c238 GetModuleHandleW 15344 328c265 15342->15344 15343->15341 15343->15342 15344->15335 15345 328e120 15346 328e12d 15345->15346 15348 328e166 15346->15348 15349 328c464 15346->15349 15350 328c46f 15349->15350 15352 328e1d8 15350->15352 15353 328c498 15350->15353 15352->15352 15354 328c4a3 15353->15354 15355 32885e0 GetModuleHandleW 15354->15355 15356 328e247 15355->15356 15359 328e2c0 15356->15359 15357 328e256 15357->15352 15360 328e2ee 15359->15360 15362 328e317 15360->15362 15364 328e3bf 15360->15364 15365 328c530 15360->15365 15363 328e3ba KiUserCallbackDispatcher 15362->15363 15362->15364 15363->15364 15366 328c53b 15365->15366 15369 328c5a4 15366->15369 15368 328e8d5 15368->15362 15370 328c5af 15369->15370 15371 328e990 GetFocus 15370->15371 15372 328e989 15370->15372 15371->15372 15372->15368 15373 3286540 15374 3286586 GetCurrentProcess 15373->15374 15376 32865d8 GetCurrentThread 15374->15376 15377 32865d1 15374->15377 15378 328660e 15376->15378 15379 3286615 GetCurrentProcess 15376->15379 15377->15376 15378->15379 15380 328664b 15379->15380 15385 328670f 15380->15385 15387 3286780 15380->15387 15381 3286673 GetCurrentThreadId 15382 32866a4 15381->15382 15386 32866a4 15385->15386 15386->15381 15388 3286783 DuplicateHandle 15387->15388 15391 3286714 15387->15391 15390 328681e 15388->15390 15390->15381 15391->15381

                                                            Control-flow Graph

                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 032865BE
                                                            • GetCurrentThread.KERNEL32 ref: 032865FB
                                                            • GetCurrentProcess.KERNEL32 ref: 03286638
                                                            • GetCurrentThreadId.KERNEL32 ref: 03286691
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2302656415.0000000003280000.00000040.00000800.00020000.00000000.sdmp, Offset: 03280000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_3280000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 05800690993e458206c8f30c1c247bfbaf6a0edab2f0882bf9a01a82232a8599
                                                            • Instruction ID: 9f10740736429049d2cc50a404d7a43d2f4b17f6ee8d1a4cb6b1da6bed3b0d12
                                                            • Opcode Fuzzy Hash: 05800690993e458206c8f30c1c247bfbaf6a0edab2f0882bf9a01a82232a8599
                                                            • Instruction Fuzzy Hash: E25197B191134ACFDB14DFA9D648B9EBBF1EF88314F248019E108A7390DB789985CB65

                                                            Control-flow Graph

                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 032865BE
                                                            • GetCurrentThread.KERNEL32 ref: 032865FB
                                                            • GetCurrentProcess.KERNEL32 ref: 03286638
                                                            • GetCurrentThreadId.KERNEL32 ref: 03286691
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2302656415.0000000003280000.00000040.00000800.00020000.00000000.sdmp, Offset: 03280000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_3280000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: d0e2abd2d6ba05739fca9e3e1fe927ea2677cd2eeccbcac15453685c21cb238a
                                                            • Instruction ID: 5ed581b92c4aea136ba171944fca3064d7bcf00ca2e8d7fd9a7262cd33653072
                                                            • Opcode Fuzzy Hash: d0e2abd2d6ba05739fca9e3e1fe927ea2677cd2eeccbcac15453685c21cb238a
                                                            • Instruction Fuzzy Hash: B35176B091134ACFDB14DFA9D548B9EBBF1FF88314F248019E509A7390DB786984CB65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 49 328bff0-328c00f 50 328c03b-328c03f 49->50 51 328c011-328c01e call 328af60 49->51 53 328c041-328c04b 50->53 54 328c053-328c094 50->54 56 328c020 51->56 57 328c034 51->57 53->54 60 328c0a1-328c0af 54->60 61 328c096-328c09e 54->61 104 328c026 call 328c698 56->104 105 328c026 call 328c689 56->105 57->50 62 328c0b1-328c0b6 60->62 63 328c0d3-328c0d5 60->63 61->60 65 328c0b8-328c0bf call 328af6c 62->65 66 328c0c1 62->66 68 328c0d8-328c0df 63->68 64 328c02c-328c02e 64->57 67 328c170-328c230 64->67 70 328c0c3-328c0d1 65->70 66->70 99 328c238-328c263 GetModuleHandleW 67->99 100 328c232-328c235 67->100 71 328c0ec-328c0f3 68->71 72 328c0e1-328c0e9 68->72 70->68 74 328c100-328c109 call 328af7c 71->74 75 328c0f5-328c0fd 71->75 72->71 80 328c10b-328c113 74->80 81 328c116-328c11b 74->81 75->74 80->81 82 328c139-328c146 81->82 83 328c11d-328c124 81->83 90 328c148-328c166 82->90 91 328c169-328c16f 82->91 83->82 85 328c126-328c136 call 328af8c call 328af9c 83->85 85->82 90->91 101 328c26c-328c280 99->101 102 328c265-328c26b 99->102 100->99 102->101 104->64 105->64
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0328C256
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2302656415.0000000003280000.00000040.00000800.00020000.00000000.sdmp, Offset: 03280000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_3280000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 2c4a73037f4d5a4361b304eefb6e2adac24fb6db630b3763f981f2d2175feafa
                                                            • Instruction ID: 00037e31bbec2c100017e72a67310ba80f6c5b8ae66e3e339bf16bf173dcb91d
                                                            • Opcode Fuzzy Hash: 2c4a73037f4d5a4361b304eefb6e2adac24fb6db630b3763f981f2d2175feafa
                                                            • Instruction Fuzzy Hash: 708147B0A11B168FD724EF69D44075ABBF1FF88700F04892ED446DBA90DB75E885CBA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 106 3286780-3286781 107 3286783-328681c DuplicateHandle 106->107 108 3286714-3286747 106->108 112 328681e-3286824 107->112 113 3286825-3286842 107->113 110 328674e-3286774 108->110 111 3286749 call 328611c 108->111 111->110 112->113
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0328680F
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2302656415.0000000003280000.00000040.00000800.00020000.00000000.sdmp, Offset: 03280000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_3280000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 37480f2159a1f75f1596fe7c780c3e7185a25c85a342d1dd19e3d228a58c5f45
                                                            • Instruction ID: a0a50eb3f553fadab8d4f2355b2ed3ab5cf679bd9ed16f4510dcf246ab329c40
                                                            • Opcode Fuzzy Hash: 37480f2159a1f75f1596fe7c780c3e7185a25c85a342d1dd19e3d228a58c5f45
                                                            • Instruction Fuzzy Hash: 83415676900249AFCB01DF99D840ADEBFF9EB48320F18805AEA14A7361D775A954CFA0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 118 3286414-3287431 CreateActCtxA 121 328743a-3287494 118->121 122 3287433-3287439 118->122 129 32874a3-32874a7 121->129 130 3287496-3287499 121->130 122->121 131 32874b8 129->131 132 32874a9-32874b5 129->132 130->129 134 32874b9 131->134 132->131 134->134
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 03287421
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2302656415.0000000003280000.00000040.00000800.00020000.00000000.sdmp, Offset: 03280000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_3280000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 5c967c631e113f9ca558a9b83e7da5b84ddd566856392a7e43192bcc03ecf741
                                                            • Instruction ID: 82efded2a395542cab0226a8aa466c1ea66ae24d8f54408be6df5553d9fe3098
                                                            • Opcode Fuzzy Hash: 5c967c631e113f9ca558a9b83e7da5b84ddd566856392a7e43192bcc03ecf741
                                                            • Instruction Fuzzy Hash: 3341D2B0C0071DCBDB24DFA9C944B9DBBF6BF44304F24806AD418AB255DBB56985CF90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 135 3287364-328736b 136 3287370-3287431 CreateActCtxA 135->136 138 328743a-3287494 136->138 139 3287433-3287439 136->139 146 32874a3-32874a7 138->146 147 3287496-3287499 138->147 139->138 148 32874b8 146->148 149 32874a9-32874b5 146->149 147->146 151 32874b9 148->151 149->148 151->151
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 03287421
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2302656415.0000000003280000.00000040.00000800.00020000.00000000.sdmp, Offset: 03280000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_3280000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 0f72d977d9e23da3bb9ecc38a11b33cf0122382bd32bae1873806174a0fb8f95
                                                            • Instruction ID: 25cd639c5812c6326f1abe0437d61f976e02f023230e08b70968121923d9c4d0
                                                            • Opcode Fuzzy Hash: 0f72d977d9e23da3bb9ecc38a11b33cf0122382bd32bae1873806174a0fb8f95
                                                            • Instruction Fuzzy Hash: 2E41D2B1C0072DCBDB24DFA9C944B8EBBF5BF84304F24805AD418AB255DB756945CF90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 152 3286788-328681c DuplicateHandle 153 328681e-3286824 152->153 154 3286825-3286842 152->154 153->154
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0328680F
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2302656415.0000000003280000.00000040.00000800.00020000.00000000.sdmp, Offset: 03280000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_3280000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 957a2c51b84d46b3b33d3b6727b32f952c1f1c3bd0845395f033998d3b4172fe
                                                            • Instruction ID: 9d376963050d30c3d0e0596483594346b758ca987377b2a18621caa0e31c92d3
                                                            • Opcode Fuzzy Hash: 957a2c51b84d46b3b33d3b6727b32f952c1f1c3bd0845395f033998d3b4172fe
                                                            • Instruction Fuzzy Hash: 7821B3B59012499FDB10CF9AD984ADEBBF4FB48320F14841AE918A3350D374A954CFA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 157 328c1f0-328c230 158 328c238-328c263 GetModuleHandleW 157->158 159 328c232-328c235 157->159 160 328c26c-328c280 158->160 161 328c265-328c26b 158->161 159->158 161->160
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0328C256
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2302656415.0000000003280000.00000040.00000800.00020000.00000000.sdmp, Offset: 03280000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_3280000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 7721e8f8bb05f4545d020683d0ab2f3ecbdbe65f49ae6fd1a6466ff1e051f5a8
                                                            • Instruction ID: 5093bce56ec4049f4bcd0a81d19996db7efdde5cd1f7eb3f1a7d6a06ab63faae
                                                            • Opcode Fuzzy Hash: 7721e8f8bb05f4545d020683d0ab2f3ecbdbe65f49ae6fd1a6466ff1e051f5a8
                                                            • Instruction Fuzzy Hash: 9F110FB6C002498FCB20DF9AC444B9EFBF4AF88220F14841AD429A7650D3B9A545CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2299789648.000000000189D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0189D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_189d000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 264b4fbc0918a987141f8a3d9f8236578ec0063ff3f50789fb4931f34d4dd401
                                                            • Instruction ID: 77344e56feed2fba444ce2d2282c578223b713d0de63f0855a0d317594a7d2f7
                                                            • Opcode Fuzzy Hash: 264b4fbc0918a987141f8a3d9f8236578ec0063ff3f50789fb4931f34d4dd401
                                                            • Instruction Fuzzy Hash: 1D212275604304EFDF15DF68D9C0B26BB61FB84358F28C66DE90A8B252C37AD507CA61
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2299789648.000000000189D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0189D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_189d000_pdf_2025 QUOTATION - #202401146778.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                            • Instruction ID: 046542eb57cdd27bd8a83cf889e10502865213f30516b8ab9d726d6c5e87d480
                                                            • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                            • Instruction Fuzzy Hash: CE11BB75504280CFDB12CF58D5C4B15BBA2FB84314F28C6AAD8098B656C33AD50ACBA2

                                                            Execution Graph

                                                            Execution Coverage:9.5%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:39
                                                            Total number of Limit Nodes:5
                                                            execution_graph 19305 151aed0 19308 151b3c1 19305->19308 19306 151aedf 19309 151b3e1 19308->19309 19310 151b404 19308->19310 19309->19310 19311 151b608 GetModuleHandleW 19309->19311 19310->19306 19312 151b635 19311->19312 19312->19306 19327 4ed2298 19328 4ed2423 19327->19328 19330 4ed22be 19327->19330 19330->19328 19331 4ed1dc0 19330->19331 19332 4ed2518 PostMessageW 19331->19332 19334 4ed2584 19332->19334 19334->19330 19313 151d378 19314 151d3be 19313->19314 19318 151d547 19314->19318 19321 151d558 19314->19321 19315 151d4ab 19320 151d586 19318->19320 19324 151b3b0 19318->19324 19320->19315 19322 151b3b0 DuplicateHandle 19321->19322 19323 151d586 19322->19323 19323->19315 19325 151d9c8 DuplicateHandle 19324->19325 19326 151da5e 19325->19326 19326->19320 19335 1514668 19336 151467a 19335->19336 19337 1514686 19336->19337 19339 1514778 19336->19339 19340 151479d 19339->19340 19344 1514878 19340->19344 19348 1514888 19340->19348 19345 15148af 19344->19345 19347 151498c 19345->19347 19352 15144f0 19345->19352 19350 15148af 19348->19350 19349 151498c 19349->19349 19350->19349 19351 15144f0 CreateActCtxA 19350->19351 19351->19349 19353 1515918 CreateActCtxA 19352->19353 19355 15159db 19353->19355

                                                            Control-flow Graph

                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0151B626
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2338366809.0000000001510000.00000040.00000800.00020000.00000000.sdmp, Offset: 01510000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_1510000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: f6a98f77461d046de8adca9a0fb32322c796ae914bb8decd69d9cd9853963822
                                                            • Instruction ID: e1e234befd96c5b41311342a757fad6bddec942007189c7ecd8070fc45dc5b45
                                                            • Opcode Fuzzy Hash: f6a98f77461d046de8adca9a0fb32322c796ae914bb8decd69d9cd9853963822
                                                            • Instruction Fuzzy Hash: F4814970A00B058FE726DF29D44079ABBF2FF88304F008A2DD55ADBA55D774E805CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 57 151590c-15159d9 CreateActCtxA 59 15159e2-1515a3c 57->59 60 15159db-15159e1 57->60 67 1515a4b-1515a4f 59->67 68 1515a3e-1515a41 59->68 60->59 69 1515a51-1515a5d 67->69 70 1515a60 67->70 68->67 69->70 72 1515a61 70->72 72->72
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 015159C9
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2338366809.0000000001510000.00000040.00000800.00020000.00000000.sdmp, Offset: 01510000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_1510000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 2755b67d44d9fb0f18bc7c456279ec6aff0b507a2deb6332e7ede67e24865e7c
                                                            • Instruction ID: 94d7dc191fe1cacf8447a5993793e6a6f5fa73a9ec53d2915c5b9194da21698a
                                                            • Opcode Fuzzy Hash: 2755b67d44d9fb0f18bc7c456279ec6aff0b507a2deb6332e7ede67e24865e7c
                                                            • Instruction Fuzzy Hash: 7541F271C0071DCBEB25CFA9C984BCEBBB6BF89704F20805AD418AB255DBB16946CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 73 15144f0-15159d9 CreateActCtxA 76 15159e2-1515a3c 73->76 77 15159db-15159e1 73->77 84 1515a4b-1515a4f 76->84 85 1515a3e-1515a41 76->85 77->76 86 1515a51-1515a5d 84->86 87 1515a60 84->87 85->84 86->87 89 1515a61 87->89 89->89
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 015159C9
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2338366809.0000000001510000.00000040.00000800.00020000.00000000.sdmp, Offset: 01510000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_1510000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 4009fe66c2af85a35cfa50e7fdce935cb0ae3a8907525f02ed15dee41b62fcf9
                                                            • Instruction ID: 9669d488a7636313e752163880f355a5de59da2f7463b9d1e934db89fa216c77
                                                            • Opcode Fuzzy Hash: 4009fe66c2af85a35cfa50e7fdce935cb0ae3a8907525f02ed15dee41b62fcf9
                                                            • Instruction Fuzzy Hash: 91410271C0071DCBEB25CFA9C984B8EBBF5BF89304F20806AD518AB255DBB16945CF90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 90 151b3b0-151da5c DuplicateHandle 92 151da65-151da82 90->92 93 151da5e-151da64 90->93 93->92
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0151D586,?,?,?,?,?), ref: 0151DA4F
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2338366809.0000000001510000.00000040.00000800.00020000.00000000.sdmp, Offset: 01510000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_1510000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: ecab208e698524ade5a95abe2e0c55cbdd26426d48e38b786c5e522d72c8fc6f
                                                            • Instruction ID: df0c0f50ff62fa1fe0c3c79dfc4cfd2a9643e266c7ba7a30b676d3267dcb331e
                                                            • Opcode Fuzzy Hash: ecab208e698524ade5a95abe2e0c55cbdd26426d48e38b786c5e522d72c8fc6f
                                                            • Instruction Fuzzy Hash: 8B21E5B5904209DFDB10CF9AD984AEEBFF5FB48320F14841AE918A7350D378A954CFA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 96 151d9c1-151da5c DuplicateHandle 97 151da65-151da82 96->97 98 151da5e-151da64 96->98 98->97
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0151D586,?,?,?,?,?), ref: 0151DA4F
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2338366809.0000000001510000.00000040.00000800.00020000.00000000.sdmp, Offset: 01510000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_1510000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: b5d57e5849fd5a8f1c88d8775065fae142c458da0e40754bb7c184d6b67a3f0c
                                                            • Instruction ID: b2d972b04587febb7754004a035e95058f6e1d2cf244ed6eeea1f0408e25471d
                                                            • Opcode Fuzzy Hash: b5d57e5849fd5a8f1c88d8775065fae142c458da0e40754bb7c184d6b67a3f0c
                                                            • Instruction Fuzzy Hash: 1A21E0B6D00209DFDB10CFA9D985AEEBBF4BB48320F14841AE918B7310D378A954CF60

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 107 4ed1dc0-4ed2582 PostMessageW 110 4ed258b-4ed259f 107->110 111 4ed2584-4ed258a 107->111 111->110
                                                            APIs
                                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 04ED2575
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2366182330.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_4ed0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: d5bfe3e9696a9173ec7f4af10bb99ad6acd542c650390e5f984f5018e96921e2
                                                            • Instruction ID: d6512dcd4b86a93f634aaf9451d1f5e8299d3f7316d4ec28300d03951b8793f0
                                                            • Opcode Fuzzy Hash: d5bfe3e9696a9173ec7f4af10bb99ad6acd542c650390e5f984f5018e96921e2
                                                            • Instruction Fuzzy Hash: 9211F5B5800349DFDB10DF99D585BDEFBF8EB48324F108459E518A7200D3B5A954CFA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 101 151b5c0-151b600 102 151b602-151b605 101->102 103 151b608-151b633 GetModuleHandleW 101->103 102->103 104 151b635-151b63b 103->104 105 151b63c-151b650 103->105 104->105
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0151B626
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2338366809.0000000001510000.00000040.00000800.00020000.00000000.sdmp, Offset: 01510000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_1510000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 7e1cd721aa1867477da38814d04041733cc143ace6d5ad7fa8fce850232f58b0
                                                            • Instruction ID: 4c878264be4d50dbc343005dbf988a5a1cad34a7a76442cbd9383756abfce193
                                                            • Opcode Fuzzy Hash: 7e1cd721aa1867477da38814d04041733cc143ace6d5ad7fa8fce850232f58b0
                                                            • Instruction Fuzzy Hash: 3B1102B5C003498FDB14CF9AC444A9EFBF4AF88220F10845AD518B7210C375A545CFA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 113 4ed2511-4ed2582 PostMessageW 115 4ed258b-4ed259f 113->115 116 4ed2584-4ed258a 113->116 116->115
                                                            APIs
                                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 04ED2575
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2366182330.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_4ed0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: badf4d776649cad46d9a3ad49d8bdf854c86b1b4fd4819b2c5e7a0ba3396835a
                                                            • Instruction ID: 553bbf092e1706d8fa9a3b806d8a1caa20c04823d6964260d5e0f982e7f9d112
                                                            • Opcode Fuzzy Hash: badf4d776649cad46d9a3ad49d8bdf854c86b1b4fd4819b2c5e7a0ba3396835a
                                                            • Instruction Fuzzy Hash: F811F2B5800349CFDB10CF99D584BDEBBF4EB48324F10855AD518A7610C3B9A645CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2335602110.00000000013AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013AD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_13ad000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 12fe2165752ce31af42a604c91c9a7ccfc43d55952e5848e60053f0d9eb6d588
                                                            • Instruction ID: 5569af085cfd670b97d2b0263dfc559b14e3bfa505e14083331ec406ecd57868
                                                            • Opcode Fuzzy Hash: 12fe2165752ce31af42a604c91c9a7ccfc43d55952e5848e60053f0d9eb6d588
                                                            • Instruction Fuzzy Hash: 002125B2504244EFDB05DF94D9C0B2ABF65FB88328F60C669ED090BA56C376D416CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2335602110.00000000013AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013AD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_13ad000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cc5a1ea1bf6709a8b34b7c2b797d83e4a5437236227bbb66d6c651ef549e6eb6
                                                            • Instruction ID: 2b99b2f58f20a4d212824802ab132c299c43141573e9e58b83f0b908d7d229e2
                                                            • Opcode Fuzzy Hash: cc5a1ea1bf6709a8b34b7c2b797d83e4a5437236227bbb66d6c651ef549e6eb6
                                                            • Instruction Fuzzy Hash: 642145B2500244EFDB05DF54D9C0B2ABF65FB8831CF60C56DE9490BA56C336D416CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2336001016.00000000013BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013BD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_13bd000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8ada6b647c3b74e8c705a4055ca7038b2d9c0134b42c7b03946c0f81b6ff7d7f
                                                            • Instruction ID: 005f918d7fa232a603062802756ca2091472a994ee87d41631a7e24f5bff3ad3
                                                            • Opcode Fuzzy Hash: 8ada6b647c3b74e8c705a4055ca7038b2d9c0134b42c7b03946c0f81b6ff7d7f
                                                            • Instruction Fuzzy Hash: FF214275604204EFCB14DF58D9C0B26BF65FB8831CF20C56DDA0A0BA52D33AC407CA61
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2336001016.00000000013BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013BD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_13bd000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f9b2b0b334efc30d5b4b3cac9d111877b9641a5d83458bf2a7ab59d3f5c26e6a
                                                            • Instruction ID: 9c30fca408c4fdae2df346037741582f76b7fe6c366f0057efd8dde1dab38de6
                                                            • Opcode Fuzzy Hash: f9b2b0b334efc30d5b4b3cac9d111877b9641a5d83458bf2a7ab59d3f5c26e6a
                                                            • Instruction Fuzzy Hash: 16216471504284EFDB05DF94D9C0B26BBA5FB8432CF20C56CEA090FA52D336D806CB61
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2336001016.00000000013BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013BD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_13bd000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d668ad8c30f14396d97fa6f47290e4fe53db0b74b6d52b4b46f8d12462d50c3b
                                                            • Instruction ID: 14eee865217b42fcdc54dc3e6cb11dd711a97bb7979ccc67df67aff1f50a787f
                                                            • Opcode Fuzzy Hash: d668ad8c30f14396d97fa6f47290e4fe53db0b74b6d52b4b46f8d12462d50c3b
                                                            • Instruction Fuzzy Hash: A521B0754083809FCB02CF24D9D4B11BF71EB46218F28C5DAD9498F6A7C33AD806CB62
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2335602110.00000000013AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013AD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_13ad000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 45d2786e60e1e4201bb004dcd9f59ae96814e242b2a6b2dda49e09682ea99c03
                                                            • Instruction ID: 9a778e24043cab5d3172d26f5359374888556dda306a9635075f7547953925d3
                                                            • Opcode Fuzzy Hash: 45d2786e60e1e4201bb004dcd9f59ae96814e242b2a6b2dda49e09682ea99c03
                                                            • Instruction Fuzzy Hash: 0521DFB6404280CFCB06CF44D9C4B16BF72FB84324F24C2A9DC480B656C33AD426CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2335602110.00000000013AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013AD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_13ad000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                            • Instruction ID: 07bc2408bdf9bed2d0c22168070b5ee1eaba317ae3c9fde1b44e4fce7fd58dbd
                                                            • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                            • Instruction Fuzzy Hash: 6811E676504284CFCB16CF54D5C4B1ABF71FB84318F24C6A9D8490B657C33AD456CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2336001016.00000000013BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013BD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_13bd000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                            • Instruction ID: cfc4e42c5d79424ee4318c50e43af7f238c198d5471e979cd4cacf123dc171de
                                                            • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                            • Instruction Fuzzy Hash: AA11BB75504280DFCB02CF54C5C0B55BFB1FB84228F24C6A9D9494F6A6C33AD40ACB61
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2335602110.00000000013AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013AD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_13ad000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7fb915244da8b66454e412dabc6ad83a6158c2b468fdb7e0540d1fd5554d9e49
                                                            • Instruction ID: 7f8737fe1b188bb48b2815ff34003e49dd2ccb1f58e7438d229485bd4cdac99f
                                                            • Opcode Fuzzy Hash: 7fb915244da8b66454e412dabc6ad83a6158c2b468fdb7e0540d1fd5554d9e49
                                                            • Instruction Fuzzy Hash: 90012B71004384DAF7185EA9CDC4B26BF9CDF41368F48C51AEE090AA96CABA9440C771
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.2335602110.00000000013AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013AD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_13ad000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ff6cd0390d65ec7813e8e9b9a548287975ba55e32d461d1fe4bdb37f78466451
                                                            • Instruction ID: 2e0a938d1dbd2126c75b47224501a909d920397ec86202d7653008cd8a1802af
                                                            • Opcode Fuzzy Hash: ff6cd0390d65ec7813e8e9b9a548287975ba55e32d461d1fe4bdb37f78466451
                                                            • Instruction Fuzzy Hash: 13F0F6714043849EF7148E19CCC4B62FF98EF81638F18C05AEE080B697C77A9844CBB1

                                                            Execution Graph

                                                            Execution Coverage:8.9%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:39
                                                            Total number of Limit Nodes:7
                                                            execution_graph 19208 f1aed0 19211 f1b3b1 19208->19211 19209 f1aedf 19212 f1b404 19211->19212 19213 f1b3e1 19211->19213 19212->19209 19213->19212 19214 f1b608 GetModuleHandleW 19213->19214 19215 f1b635 19214->19215 19215->19209 19226 4a02198 19227 4a02323 19226->19227 19229 4a021be 19226->19229 19229->19227 19230 4a01d90 19229->19230 19231 4a02418 PostMessageW 19230->19231 19232 4a02484 19231->19232 19232->19229 19216 f1d378 19217 f1d3be GetCurrentProcess 19216->19217 19219 f1d410 GetCurrentThread 19217->19219 19220 f1d409 19217->19220 19221 f1d446 19219->19221 19222 f1d44d GetCurrentProcess 19219->19222 19220->19219 19221->19222 19225 f1d483 19222->19225 19223 f1d4ab GetCurrentThreadId 19224 f1d4dc 19223->19224 19225->19223 19233 f1d9c8 DuplicateHandle 19234 f1da5e 19233->19234 19235 f14668 19236 f1467a 19235->19236 19237 f14686 19236->19237 19239 f14778 19236->19239 19240 f1479d 19239->19240 19244 f14888 19240->19244 19248 f14878 19240->19248 19245 f148af 19244->19245 19247 f1498c 19245->19247 19252 f144f0 19245->19252 19250 f148af 19248->19250 19249 f1498c 19249->19249 19250->19249 19251 f144f0 CreateActCtxA 19250->19251 19251->19249 19253 f15918 CreateActCtxA 19252->19253 19255 f159db 19253->19255

                                                            Control-flow Graph

                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 00F1D3F6
                                                            • GetCurrentThread.KERNEL32 ref: 00F1D433
                                                            • GetCurrentProcess.KERNEL32 ref: 00F1D470
                                                            • GetCurrentThreadId.KERNEL32 ref: 00F1D4C9
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2408292210.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_f10000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 89565c56ecd6acdda59e54dcf616fa0509862417aa8701766ff8d1c18dcd157a
                                                            • Instruction ID: 4103b32d27dfa6024075697891f52f1589ad657cb30ea0176a89ed53e1ef0a5f
                                                            • Opcode Fuzzy Hash: 89565c56ecd6acdda59e54dcf616fa0509862417aa8701766ff8d1c18dcd157a
                                                            • Instruction Fuzzy Hash: D45147B0900349CFEB54DFA9D548BEEBBF1FF88314F208459D409A7251D7746984CB65

                                                            Control-flow Graph

                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 00F1D3F6
                                                            • GetCurrentThread.KERNEL32 ref: 00F1D433
                                                            • GetCurrentProcess.KERNEL32 ref: 00F1D470
                                                            • GetCurrentThreadId.KERNEL32 ref: 00F1D4C9
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2408292210.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_f10000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: efc4a08c9583d9bde19538fa59b28ccb7444499eb7836c67297f1258d42aed95
                                                            • Instruction ID: a33fb55b16002d2b03b2eb6fd5a799eb97a29a0838e14e71e5f502845c91947d
                                                            • Opcode Fuzzy Hash: efc4a08c9583d9bde19538fa59b28ccb7444499eb7836c67297f1258d42aed95
                                                            • Instruction Fuzzy Hash: 5C5137B0900349CFEB54DFAAD548BEEBBF1FF88314F208459D009A7250DB746984CB65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 45 f1b3b1-f1b3df 46 f1b3e1-f1b3ee call f19f4c 45->46 47 f1b40b-f1b40f 45->47 54 f1b3f0 46->54 55 f1b404 46->55 48 f1b411-f1b41b 47->48 49 f1b423-f1b464 47->49 48->49 56 f1b471-f1b47f 49->56 57 f1b466-f1b46e 49->57 101 f1b3f6 call f1b659 54->101 102 f1b3f6 call f1b668 54->102 55->47 58 f1b481-f1b486 56->58 59 f1b4a3-f1b4a5 56->59 57->56 62 f1b491 58->62 63 f1b488-f1b48f call f19f58 58->63 61 f1b4a8-f1b4af 59->61 60 f1b3fc-f1b3fe 60->55 64 f1b540-f1b600 60->64 65 f1b4b1-f1b4b9 61->65 66 f1b4bc-f1b4c3 61->66 68 f1b493-f1b4a1 62->68 63->68 96 f1b602-f1b605 64->96 97 f1b608-f1b633 GetModuleHandleW 64->97 65->66 69 f1b4d0-f1b4d9 call f19f68 66->69 70 f1b4c5-f1b4cd 66->70 68->61 76 f1b4e6-f1b4eb 69->76 77 f1b4db-f1b4e3 69->77 70->69 78 f1b509-f1b516 76->78 79 f1b4ed-f1b4f4 76->79 77->76 85 f1b539-f1b53f 78->85 86 f1b518-f1b536 78->86 79->78 81 f1b4f6-f1b506 call f19f78 call f1afbc 79->81 81->78 86->85 96->97 98 f1b635-f1b63b 97->98 99 f1b63c-f1b650 97->99 98->99 101->60 102->60
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 00F1B626
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2408292210.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_f10000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: abaf016de6e7da2bd4e9838ba4e6d0ea4304d61fe7987e5845926ffed60c8726
                                                            • Instruction ID: 074a43d98477ed7b74d062ff1a5ab57054ada3c0e8da88dc6b8901588f998bc0
                                                            • Opcode Fuzzy Hash: abaf016de6e7da2bd4e9838ba4e6d0ea4304d61fe7987e5845926ffed60c8726
                                                            • Instruction Fuzzy Hash: 0C814370A00B05CFD724DF29D4517AABBF1BF88310F04892EE48AD7A52DB79A845CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 103 f1590c-f159d9 CreateActCtxA 105 f159e2-f15a3c 103->105 106 f159db-f159e1 103->106 113 f15a4b-f15a4f 105->113 114 f15a3e-f15a41 105->114 106->105 115 f15a51-f15a5d 113->115 116 f15a60 113->116 114->113 115->116 118 f15a61 116->118 118->118
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 00F159C9
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2408292210.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_f10000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 6331b8e9e0bbb5e72568c4584708364fffdcdc0622851f83d779eae848285617
                                                            • Instruction ID: 8b099706b97d5487764b889740aa8c4e0582cbf213366fe5dcbcea97e50fd959
                                                            • Opcode Fuzzy Hash: 6331b8e9e0bbb5e72568c4584708364fffdcdc0622851f83d779eae848285617
                                                            • Instruction Fuzzy Hash: F24102B1C00719CBEB24CFA9C884BDEBBF5BF88714F60815AD408AB251DB756946CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 119 f144f0-f159d9 CreateActCtxA 122 f159e2-f15a3c 119->122 123 f159db-f159e1 119->123 130 f15a4b-f15a4f 122->130 131 f15a3e-f15a41 122->131 123->122 132 f15a51-f15a5d 130->132 133 f15a60 130->133 131->130 132->133 135 f15a61 133->135 135->135
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 00F159C9
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2408292210.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_f10000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 78ef04b249c6cf2961e033bf963532f8dd00db4fe87154820b73a743f2567dee
                                                            • Instruction ID: 50ebbb071a3e494b6c7cc92fa8bab841384bbaa4b8a8108b605b0f54a2605625
                                                            • Opcode Fuzzy Hash: 78ef04b249c6cf2961e033bf963532f8dd00db4fe87154820b73a743f2567dee
                                                            • Instruction Fuzzy Hash: 4241DFB0C00719CBEB24CFAAC884BDEBBF5BF88714F60815AD409AB251DB756945CF90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 136 f1d9c1-f1d9c6 137 f1d9c8-f1da5c DuplicateHandle 136->137 138 f1da65-f1da82 137->138 139 f1da5e-f1da64 137->139 139->138
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00F1DA4F
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2408292210.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_f10000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: c53e9692958ccf166e7a65a5a686713a2c4b2849346d96c454e841ba3d91f45b
                                                            • Instruction ID: eb15fb236b2a1af5e8303a94541b4763a9002949a32a735d3f8fbec3d06ca0ea
                                                            • Opcode Fuzzy Hash: c53e9692958ccf166e7a65a5a686713a2c4b2849346d96c454e841ba3d91f45b
                                                            • Instruction Fuzzy Hash: 5C21B5B5D00249DFDB10CF9AD584AEEBBF4EB48320F14841AE914A3351D379A954CF65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 142 f1d9c8-f1da5c DuplicateHandle 143 f1da65-f1da82 142->143 144 f1da5e-f1da64 142->144 144->143
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00F1DA4F
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2408292210.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_f10000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: f15d24d056d5a69cffafbb883fd13ecbaeadf6dc630125aa0d9523a43dfd9e28
                                                            • Instruction ID: 40d56072c59cb739a13005a61db6916c3628ddab5710d182da81b2a9c2617d61
                                                            • Opcode Fuzzy Hash: f15d24d056d5a69cffafbb883fd13ecbaeadf6dc630125aa0d9523a43dfd9e28
                                                            • Instruction Fuzzy Hash: 7921C4B5900249DFDB10CF9AD984ADEBBF4FF48320F14841AE918A3351D379A954CF65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 147 4a02410-4a02482 PostMessageW 148 4a02484-4a0248a 147->148 149 4a0248b-4a0249f 147->149 148->149
                                                            APIs
                                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 04A02475
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2468605661.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_4a00000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: 516769cbafbf38d9ceec4ad89e78df7d2b554a0b2e9eaf91b0c96a5f24ba8e55
                                                            • Instruction ID: 3201b349cf9ed7f814ab5e9b6b09b52fce4e9e4897af08f465d46d1fad53f2cc
                                                            • Opcode Fuzzy Hash: 516769cbafbf38d9ceec4ad89e78df7d2b554a0b2e9eaf91b0c96a5f24ba8e55
                                                            • Instruction Fuzzy Hash: BC11F2B6800349DFDB10CF9AD889BDEBBF8EB48724F10845AD558A7250C3B5A945CFA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 157 4a01d90-4a02482 PostMessageW 159 4a02484-4a0248a 157->159 160 4a0248b-4a0249f 157->160 159->160
                                                            APIs
                                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 04A02475
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2468605661.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_4a00000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: 7bf9cf08c57895cb71d65523deb9ebc300467aa979f1baedf0afe89408ddfd6e
                                                            • Instruction ID: a9f9eda9997971b9d4fb3f287c2aaca7c146bafbb195368cad4cdad96991bc45
                                                            • Opcode Fuzzy Hash: 7bf9cf08c57895cb71d65523deb9ebc300467aa979f1baedf0afe89408ddfd6e
                                                            • Instruction Fuzzy Hash: 1A11F5B6800349DFDB10DF9AD449BDEBBF8EB48324F10845AE515A7250D375A944CFA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 151 f1b5c0-f1b600 152 f1b602-f1b605 151->152 153 f1b608-f1b633 GetModuleHandleW 151->153 152->153 154 f1b635-f1b63b 153->154 155 f1b63c-f1b650 153->155 154->155
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 00F1B626
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2408292210.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_f10000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: b59a3bb4d65afb921b4d64889dd856836da583e7cd0bbb768e00ae9b7f1104ef
                                                            • Instruction ID: bf59c540858237d54af09f8d1840d721907aa06bb95487e53e3927c43c22cf94
                                                            • Opcode Fuzzy Hash: b59a3bb4d65afb921b4d64889dd856836da583e7cd0bbb768e00ae9b7f1104ef
                                                            • Instruction Fuzzy Hash: 3711DFB6C00749CFDB10CF9AD444ADEFBF4AF88324F14845AD419A7210D3B9A545CFA5
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2405383671.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_d3d000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ee01d0c96a46ed998cb523b52f87ef35fc06acdbd0a279b37b3ae09f9e36745b
                                                            • Instruction ID: 5a21c64989169e10bf117823e41a0019d50748f5d1fa59493c541aa569db5799
                                                            • Opcode Fuzzy Hash: ee01d0c96a46ed998cb523b52f87ef35fc06acdbd0a279b37b3ae09f9e36745b
                                                            • Instruction Fuzzy Hash: 2E213479504300EFDB05DF10E9C0B26BBA2FB84314F24C56DE9494B292C776D80ACE71
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2405383671.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_d3d000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d1f8c70aa202b1ac03ba1cf2e00d8aec82a30f8d2ff9e8e391eb025ee3452bb0
                                                            • Instruction ID: f0eb650c5df0b9062ad4e5b2c3fc0dec989f5e32a2bdb6fb60c443106af0c46f
                                                            • Opcode Fuzzy Hash: d1f8c70aa202b1ac03ba1cf2e00d8aec82a30f8d2ff9e8e391eb025ee3452bb0
                                                            • Instruction Fuzzy Hash: 03212575504200DFCB18DF14E5C0B26BB66FB84B14F24C56DE94A0B292C376D807CE71
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2405383671.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_d3d000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 709b0d71465d8815091fccbb5b968e92c2c25b400da9772d53a917ee4f9a658e
                                                            • Instruction ID: 8f89f35b9efca4aa8d66764fc05c006f20a76f80fe87e7d0c6eca084d2ffc2c8
                                                            • Opcode Fuzzy Hash: 709b0d71465d8815091fccbb5b968e92c2c25b400da9772d53a917ee4f9a658e
                                                            • Instruction Fuzzy Hash: C0214F755093808FCB16CF24D994715BF72AB46614F28C5EAD8498B6A7C33A980ACB62
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2405383671.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_d3d000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                            • Instruction ID: de1faf9bdfc6149a5e29ee60db977297d971207d215c4c9c99f3e6acad700923
                                                            • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                            • Instruction Fuzzy Hash: F5118B79504284DFCB16CF10D5C4B16BBA2FB84314F28C6A9D8494B6A6C33AD85ACF61
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2405272700.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_d2d000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a51f28948ec3adc708609d9bb3226e8bb154756970fa0f08c0110e5cfd8b5a47
                                                            • Instruction ID: 2bfca52ea6236e42e2cb0634c2c5c39ec46c9fe5cc6891fa16d1539a1bd13234
                                                            • Opcode Fuzzy Hash: a51f28948ec3adc708609d9bb3226e8bb154756970fa0f08c0110e5cfd8b5a47
                                                            • Instruction Fuzzy Hash: 94012B714083509AF7104E25DD84B67BF98DF51328F1CC55AED4A4B292C6BDD840C6B1
                                                            Memory Dump Source
                                                            • Source File: 00000007.00000002.2405272700.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_7_2_d2d000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5c004acf3fba3f8a6c5a374aa9cba1ca701fafcb5fc6a56210f137d559fcc417
                                                            • Instruction ID: f9f7434f60e0efe711971686b140a7aa7603de66b505c109791631b68b8f5a67
                                                            • Opcode Fuzzy Hash: 5c004acf3fba3f8a6c5a374aa9cba1ca701fafcb5fc6a56210f137d559fcc417
                                                            • Instruction Fuzzy Hash: 30F0C2724043549AF7108E15DC84B62FF98EB91738F18C05AED090B286C27D9C44CBB1

                                                            Execution Graph

                                                            Execution Coverage:9.5%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:534
                                                            Total number of Limit Nodes:50
                                                            execution_graph 40570 2fb4668 40571 2fb4676 40570->40571 40580 2fb6de0 40571->40580 40574 2fb4704 40589 5566ad1 40574->40589 40594 5566b00 40574->40594 40598 5566b10 40574->40598 40575 2fb470c 40581 2fb6e05 40580->40581 40602 2fb6edf 40581->40602 40606 2fb6ef0 40581->40606 40582 2fb46e9 40585 2fb421c 40582->40585 40586 2fb4227 40585->40586 40614 2fb8560 40586->40614 40588 2fb8806 40588->40574 40590 5566ad4 40589->40590 40591 5566ad9 40589->40591 40590->40591 40687 5565ad8 40590->40687 40591->40575 40595 5566b04 40594->40595 40596 5565ad8 10 API calls 40595->40596 40597 5566b42 40596->40597 40597->40575 40599 5566b11 40598->40599 40600 5565ad8 10 API calls 40599->40600 40601 5566b42 40600->40601 40601->40575 40603 2fb6f17 40602->40603 40604 2fb6ff4 40603->40604 40610 2fb6414 40603->40610 40607 2fb6f17 40606->40607 40608 2fb6ff4 40607->40608 40609 2fb6414 CreateActCtxA 40607->40609 40609->40608 40611 2fb7370 CreateActCtxA 40610->40611 40613 2fb7433 40611->40613 40615 2fb856b 40614->40615 40618 2fb8580 40615->40618 40617 2fb88dd 40617->40588 40619 2fb858b 40618->40619 40622 2fb85b0 40619->40622 40621 2fb89ba 40621->40617 40623 2fb85bb 40622->40623 40626 2fb85e0 40623->40626 40625 2fb8aad 40625->40621 40627 2fb85eb 40626->40627 40629 2fb9e93 40627->40629 40633 2fbbed1 40627->40633 40628 2fb9ed1 40628->40625 40629->40628 40639 2fbdf70 40629->40639 40644 2fbdf60 40629->40644 40634 2fbbeda 40633->40634 40636 2fbbe91 40633->40636 40649 2fbbef8 40634->40649 40652 2fbbf08 40634->40652 40635 2fbbee6 40635->40629 40636->40629 40640 2fbdf91 40639->40640 40641 2fbdfb5 40640->40641 40660 2fbe120 40640->40660 40664 2fbe110 40640->40664 40641->40628 40645 2fbdf70 40644->40645 40646 2fbdfb5 40645->40646 40647 2fbe120 10 API calls 40645->40647 40648 2fbe110 10 API calls 40645->40648 40646->40628 40647->40646 40648->40646 40655 2fbbff0 40649->40655 40650 2fbbf17 40650->40635 40653 2fbbf17 40652->40653 40654 2fbbff0 GetModuleHandleW 40652->40654 40653->40635 40654->40653 40656 2fbc034 40655->40656 40657 2fbc011 40655->40657 40656->40650 40657->40656 40658 2fbc238 GetModuleHandleW 40657->40658 40659 2fbc265 40658->40659 40659->40650 40662 2fbe12d 40660->40662 40661 2fbe166 40661->40641 40662->40661 40668 2fbc464 40662->40668 40665 2fbe120 40664->40665 40666 2fbe166 40665->40666 40667 2fbc464 10 API calls 40665->40667 40666->40641 40667->40666 40669 2fbc46f 40668->40669 40671 2fbe1d8 40669->40671 40672 2fbc498 40669->40672 40671->40671 40673 2fbc4a3 40672->40673 40674 2fb85e0 10 API calls 40673->40674 40675 2fbe247 40674->40675 40681 2fbe2c0 9 API calls 40675->40681 40676 2fbe256 40682 2fbc4a8 40676->40682 40678 2fbe270 40679 2fbc4b8 9 API calls 40678->40679 40680 2fbe277 40679->40680 40680->40671 40681->40676 40683 2fbc4b3 40682->40683 40684 2fbf01c 9 API calls 40683->40684 40686 2fbf7c9 40683->40686 40685 2fbf7c4 40684->40685 40685->40678 40686->40678 40688 5565ae3 40687->40688 40691 5565b14 40688->40691 40690 5566c54 40695 5565b1f 40691->40695 40692 55672c9 40692->40690 40693 556716e 40694 55672a8 40693->40694 40698 2fbdf70 10 API calls 40693->40698 40699 2fbdf60 10 API calls 40693->40699 40694->40692 40696 5566e00 9 API calls 40694->40696 40695->40692 40695->40693 40700 5566e00 40695->40700 40696->40692 40698->40694 40699->40694 40701 5566e0b 40700->40701 40703 5567507 9 API calls 40701->40703 40704 5567518 9 API calls 40701->40704 40702 5567504 40702->40693 40703->40702 40704->40702 40705 148d01c 40706 148d034 40705->40706 40707 148d08e 40706->40707 40710 5562f18 40706->40710 40719 5562f28 40706->40719 40711 5562f28 40710->40711 40712 5562f89 40711->40712 40714 5562f79 40711->40714 40715 5562f87 40712->40715 40744 5562b64 40712->40744 40728 55630b0 40714->40728 40733 556317c 40714->40733 40739 55630a0 40714->40739 40715->40715 40722 5562f55 40719->40722 40720 5562f89 40721 5562b64 CallWindowProcW 40720->40721 40724 5562f87 40720->40724 40721->40724 40722->40720 40723 5562f79 40722->40723 40725 55630b0 10 API calls 40723->40725 40726 55630a0 10 API calls 40723->40726 40727 556317c 10 API calls 40723->40727 40724->40724 40725->40724 40726->40724 40727->40724 40730 55630c4 40728->40730 40729 5563150 40729->40715 40748 5563168 40730->40748 40753 5563159 40730->40753 40734 556318a 40733->40734 40735 556313a 40733->40735 40737 5563168 10 API calls 40735->40737 40738 5563159 10 API calls 40735->40738 40736 5563150 40736->40715 40737->40736 40738->40736 40741 55630b0 40739->40741 40740 5563150 40740->40715 40742 5563168 10 API calls 40741->40742 40743 5563159 10 API calls 40741->40743 40742->40740 40743->40740 40745 5562b6f 40744->40745 40746 55643ea CallWindowProcW 40745->40746 40747 5564399 40745->40747 40746->40747 40747->40715 40749 5563179 40748->40749 40759 5564321 40748->40759 40762 5568260 40748->40762 40780 5568270 40748->40780 40749->40729 40754 5563168 40753->40754 40755 5563179 40754->40755 40756 5568270 10 API calls 40754->40756 40757 5568260 10 API calls 40754->40757 40758 5564321 CallWindowProcW 40754->40758 40755->40729 40756->40755 40757->40755 40758->40755 40760 5562b64 CallWindowProcW 40759->40760 40761 556433a 40760->40761 40761->40749 40763 556826c 40762->40763 40764 55682d0 40763->40764 40765 556828e 40763->40765 40766 556829c 40763->40766 40764->40766 40768 556855c 40764->40768 40767 5568293 40765->40767 40770 55682aa 40765->40770 40776 55683d6 40766->40776 40812 55689f0 40766->40812 40817 5568a00 40766->40817 40767->40766 40769 55684ba 40767->40769 40806 5567b88 40768->40806 40798 5567ad8 40769->40798 40770->40766 40773 5568524 40770->40773 40774 55684c8 40770->40774 40770->40776 40802 5567b48 40773->40802 40777 5567ae8 9 API calls 40774->40777 40776->40749 40777->40776 40781 5568271 40780->40781 40782 55682d0 40781->40782 40783 556828e 40781->40783 40784 556829c 40781->40784 40782->40784 40787 556855c 40782->40787 40785 5568293 40783->40785 40786 55682aa 40783->40786 40795 55683d6 40784->40795 40796 55689f0 CallWindowProcW 40784->40796 40797 5568a00 CallWindowProcW 40784->40797 40785->40784 40788 55684ba 40785->40788 40786->40784 40791 5568524 40786->40791 40792 55684c8 40786->40792 40786->40795 40790 5567b88 10 API calls 40787->40790 40789 5567ad8 CallWindowProcW 40788->40789 40789->40795 40790->40795 40793 5567b48 CallWindowProcW 40791->40793 40794 5567ae8 9 API calls 40792->40794 40793->40795 40794->40795 40795->40749 40796->40795 40797->40795 40799 5567ae3 40798->40799 40800 5568a00 CallWindowProcW 40799->40800 40801 5568c16 40800->40801 40801->40776 40803 5567b53 40802->40803 40804 5568a00 CallWindowProcW 40803->40804 40805 556d0fc 40804->40805 40805->40776 40807 5567b93 40806->40807 40808 5567ae8 9 API calls 40807->40808 40809 556c980 40808->40809 40810 5568a00 CallWindowProcW 40809->40810 40811 556c989 40810->40811 40811->40776 40813 55689f4 40812->40813 40814 55689e4 40813->40814 40822 5568a20 40813->40822 40814->40776 40815 5568a18 40815->40776 40818 5568a01 40817->40818 40819 5568a0b 40818->40819 40821 5568a20 CallWindowProcW 40818->40821 40819->40776 40820 5568a18 40820->40776 40821->40820 40823 5568a24 40822->40823 40824 5568a60 40823->40824 40825 5568a3e 40823->40825 40827 5563720 CallWindowProcW 40824->40827 40826 5568a4c 40825->40826 40831 5563720 40825->40831 40826->40815 40830 5568a67 40827->40830 40829 5568a88 40829->40815 40830->40815 40833 556376c 40831->40833 40832 55637bd 40832->40829 40832->40832 40833->40832 40836 5568a90 40833->40836 40840 5568aa0 40833->40840 40837 5568a94 40836->40837 40838 5562b64 CallWindowProcW 40837->40838 40839 5568b09 40837->40839 40838->40839 40839->40832 40841 5568aa1 40840->40841 40842 5562b64 CallWindowProcW 40841->40842 40843 5568b09 40841->40843 40842->40843 40843->40832 40252 5565eb3 40253 5565ebc 40252->40253 40255 5565eda 40252->40255 40253->40255 40258 5564630 40253->40258 40256 5564630 9 API calls 40255->40256 40257 5566013 40255->40257 40256->40257 40259 5564640 40258->40259 40260 556467d 40259->40260 40263 5567cc0 40259->40263 40282 5567cb0 40259->40282 40260->40255 40269 5567cc1 40263->40269 40265 5567e03 40305 5567030 40265->40305 40267 5567e0d 40319 55678bc 40267->40319 40301 55678ac 40269->40301 40272 5567e3c 40273 5564630 9 API calls 40272->40273 40274 5567f1f 40272->40274 40277 5567ec5 40273->40277 40275 5567f80 40274->40275 40341 2fbf01c 40274->40341 40345 556cf80 40275->40345 40349 556cf90 40275->40349 40276 5567f94 40277->40274 40330 5565a6c 40277->40330 40288 5567cb4 40282->40288 40283 55678ac 9 API calls 40284 5567e03 40283->40284 40285 5567030 9 API calls 40284->40285 40286 5567e0d 40285->40286 40287 55678bc 9 API calls 40286->40287 40289 5567e15 40287->40289 40288->40283 40290 55678cc 9 API calls 40289->40290 40291 5567e3c 40289->40291 40290->40291 40292 5564630 9 API calls 40291->40292 40293 5567f1f 40291->40293 40296 5567ec5 40292->40296 40294 5567f80 40293->40294 40298 2fbf01c 9 API calls 40293->40298 40299 556cf90 9 API calls 40294->40299 40300 556cf80 9 API calls 40294->40300 40295 5567f94 40296->40293 40297 5565a6c 9 API calls 40296->40297 40297->40293 40298->40294 40299->40295 40300->40295 40302 55678b7 40301->40302 40303 5564630 9 API calls 40302->40303 40304 55696b8 40302->40304 40303->40304 40304->40265 40308 556703b 40305->40308 40306 5569868 40306->40267 40307 55697e1 40309 556981a 40307->40309 40310 5565a6c 9 API calls 40307->40310 40308->40306 40308->40307 40311 5569834 40308->40311 40353 5568fe4 40308->40353 40312 5565a6c 9 API calls 40309->40312 40313 556980c 40310->40313 40311->40306 40317 5564630 9 API calls 40311->40317 40314 5569826 40312->40314 40357 5568ff4 40313->40357 40316 5568ff4 9 API calls 40314->40316 40316->40311 40317->40306 40320 55678c7 40319->40320 40321 5567e15 40320->40321 40322 5564630 9 API calls 40320->40322 40321->40272 40325 55678cc 40321->40325 40323 556b5ec 40322->40323 40367 5569de8 40323->40367 40327 55678d7 40325->40327 40326 556bcb6 40326->40272 40327->40326 40328 5564630 9 API calls 40327->40328 40329 556bd86 40328->40329 40329->40272 40332 5565a77 40330->40332 40331 556b4ae 40331->40274 40332->40331 40333 556b565 SendMessageW 40332->40333 40334 556b4f3 40332->40334 40337 556b59c 40333->40337 40336 5564630 8 API calls 40334->40336 40338 556b508 40336->40338 40337->40274 40339 5569dc0 SendMessageW 40338->40339 40340 556b519 40339->40340 40340->40274 40342 2fbf027 40341->40342 40344 2fbf8f5 40342->40344 40377 2fbc4b8 40342->40377 40344->40275 40346 556cf90 40345->40346 40347 55678bc 9 API calls 40346->40347 40348 556cfa4 40347->40348 40348->40276 40350 556cf9d 40349->40350 40351 55678bc 9 API calls 40350->40351 40352 556cfa4 40351->40352 40352->40276 40354 5568fef 40353->40354 40363 5569d94 9 API calls 40354->40363 40356 556b35d 40356->40307 40358 5568fff 40357->40358 40359 5564630 9 API calls 40358->40359 40360 556b508 40359->40360 40364 5569dc0 40360->40364 40363->40356 40365 556b530 SendMessageW 40364->40365 40366 556b519 40365->40366 40366->40309 40368 5569df3 40367->40368 40371 5567ae8 40368->40371 40370 556b6d4 40370->40321 40372 5567af3 40371->40372 40373 556bab7 40372->40373 40374 5564630 9 API calls 40372->40374 40373->40370 40375 556b8d4 40374->40375 40375->40373 40376 55678bc 9 API calls 40375->40376 40376->40373 40378 2fbc4c3 40377->40378 40381 2fbf104 40378->40381 40380 2fbfdcf 40380->40344 40385 2fbf10f 40381->40385 40382 2fbff78 40382->40380 40383 2fbff41 40388 556d250 40383->40388 40393 556d260 40383->40393 40384 2fbf104 9 API calls 40384->40385 40385->40382 40385->40383 40385->40384 40390 556d272 40388->40390 40389 556d2af 40389->40382 40390->40389 40398 556d5b8 40390->40398 40404 556d5a8 40390->40404 40394 556d272 40393->40394 40395 556d2af 40394->40395 40396 556d5b8 9 API calls 40394->40396 40397 556d5a8 9 API calls 40394->40397 40395->40382 40396->40395 40397->40395 40411 5567507 40398->40411 40423 5567518 40398->40423 40399 556d5d0 40435 556c67c 40399->40435 40401 556d5d9 40401->40389 40405 556d5b8 40404->40405 40409 5567507 9 API calls 40405->40409 40410 5567518 9 API calls 40405->40410 40406 556d5d0 40407 556c67c 9 API calls 40406->40407 40408 556d5d9 40407->40408 40408->40389 40409->40406 40410->40406 40415 556750c 40411->40415 40412 5567552 40412->40399 40413 556762f 40440 2fbe2c0 40413->40440 40415->40412 40415->40413 40418 5567692 40415->40418 40417 5567665 40417->40399 40418->40417 40419 5564630 9 API calls 40418->40419 40420 5567737 40419->40420 40420->40417 40421 5567030 9 API calls 40420->40421 40421->40417 40426 5567519 40423->40426 40424 5567552 40424->40399 40425 556762f 40434 2fbe2c0 9 API calls 40425->40434 40426->40424 40426->40425 40430 5567692 40426->40430 40427 556763d 40428 5564630 9 API calls 40427->40428 40429 5567665 40427->40429 40428->40429 40429->40399 40430->40429 40431 5564630 9 API calls 40430->40431 40432 5567737 40431->40432 40432->40429 40433 5567030 9 API calls 40432->40433 40433->40429 40434->40427 40437 556c687 40435->40437 40436 556da74 40436->40401 40437->40436 40465 556dae7 40437->40465 40483 556daf8 40437->40483 40441 2fbe2ee 40440->40441 40442 2fbe3bf 40441->40442 40443 2fbe42b 40441->40443 40444 2fbe5ca 40441->40444 40448 5564630 8 API calls 40441->40448 40452 556461f 40441->40452 40442->40443 40445 2fbc4b8 8 API calls 40442->40445 40443->40444 40457 556d690 40443->40457 40461 556d683 40443->40461 40445->40443 40446 2fbe366 40447 2fbe3ba KiUserCallbackDispatcher 40446->40447 40447->40442 40448->40446 40453 5564640 40452->40453 40454 556467d 40453->40454 40455 5567cc0 9 API calls 40453->40455 40456 5567cb0 9 API calls 40453->40456 40454->40446 40455->40454 40456->40454 40458 556d691 40457->40458 40459 5564630 9 API calls 40458->40459 40460 556d7a0 40458->40460 40459->40460 40460->40444 40462 556d68c 40461->40462 40463 5564630 9 API calls 40462->40463 40464 556d7a0 40462->40464 40463->40464 40464->40444 40468 556db53 40465->40468 40466 556dbbc 40478 5564630 9 API calls 40466->40478 40481 556dc89 40466->40481 40467 556db8d 40467->40466 40501 556c90c 40467->40501 40468->40467 40470 5564630 9 API calls 40468->40470 40470->40467 40471 556dc9b 40472 556dca9 40471->40472 40473 5564630 9 API calls 40471->40473 40474 556dcc7 40472->40474 40475 556c90c EnumThreadWindows 40472->40475 40473->40472 40476 556dcd5 40474->40476 40477 5564630 9 API calls 40474->40477 40475->40474 40476->40436 40477->40476 40479 556dc78 40478->40479 40506 556c91c 40479->40506 40510 556ead8 40481->40510 40484 556db53 40483->40484 40485 556db8d 40484->40485 40488 5564630 9 API calls 40484->40488 40486 556c90c EnumThreadWindows 40485->40486 40495 556dbbc 40485->40495 40486->40495 40487 556dc9b 40489 556dca9 40487->40489 40490 5564630 9 API calls 40487->40490 40488->40485 40491 556dcc7 40489->40491 40492 556c90c EnumThreadWindows 40489->40492 40490->40489 40493 556dcd5 40491->40493 40494 5564630 9 API calls 40491->40494 40492->40491 40493->40436 40494->40493 40496 5564630 9 API calls 40495->40496 40499 556dc89 40495->40499 40497 556dc78 40496->40497 40498 556c91c EnumThreadWindows 40497->40498 40498->40499 40500 556ead8 9 API calls 40499->40500 40500->40487 40505 556c917 40501->40505 40502 556e177 40502->40466 40503 556e236 EnumThreadWindows 40504 556e268 40503->40504 40504->40466 40505->40502 40505->40503 40507 556e1e8 EnumThreadWindows 40506->40507 40509 556e268 40507->40509 40509->40481 40511 556eb15 40510->40511 40512 556ed72 40511->40512 40513 5564630 9 API calls 40511->40513 40512->40512 40515 556eb89 40513->40515 40514 556ec8e 40516 5564630 9 API calls 40514->40516 40517 556ed4e 40514->40517 40515->40514 40518 556ec83 40515->40518 40519 556edb3 9 API calls 40515->40519 40520 556edc8 9 API calls 40515->40520 40516->40517 40521 5567cc0 9 API calls 40518->40521 40522 5567cb0 9 API calls 40518->40522 40519->40518 40520->40518 40521->40514 40522->40514 40844 2fb6540 40845 2fb6569 40844->40845 40849 2fb6720 40845->40849 40852 2fb670f 40845->40852 40846 2fb6673 40857 2fb611c 40849->40857 40853 2fb6713 40852->40853 40854 2fb6760 40852->40854 40855 2fb611c DuplicateHandle 40853->40855 40854->40846 40856 2fb674e 40855->40856 40856->40846 40858 2fb6788 DuplicateHandle 40857->40858 40860 2fb674e 40858->40860 40860->40846 40523 5562018 SetWindowLongW 40524 5562084 40523->40524 40525 55644b8 40526 55644c8 40525->40526 40530 5568e08 40526->40530 40536 5568df9 40526->40536 40527 55644f1 40531 5568e09 40530->40531 40542 5565c08 40531->40542 40533 5568e92 40554 5567c50 40533->40554 40535 5568e99 40535->40527 40537 5568dfc 40536->40537 40538 5565c08 9 API calls 40537->40538 40539 5568e92 40538->40539 40540 5567c50 9 API calls 40539->40540 40541 5568e99 40540->40541 40541->40527 40546 5565c34 40542->40546 40544 5564630 9 API calls 40545 5566013 40544->40545 40545->40533 40552 5565e6c 40546->40552 40564 55655fc 40546->40564 40547 5565ced 40548 5564630 9 API calls 40547->40548 40553 5565d95 40547->40553 40549 5565d5f 40548->40549 40550 5564630 9 API calls 40549->40550 40550->40553 40551 5564630 9 API calls 40551->40552 40552->40544 40552->40545 40553->40551 40555 5567c5b 40554->40555 40556 5569435 40555->40556 40557 55693fd 40555->40557 40563 5569404 40555->40563 40559 5569486 40556->40559 40560 556945a 40556->40560 40558 5564630 9 API calls 40557->40558 40558->40563 40562 5564630 9 API calls 40559->40562 40561 5564630 9 API calls 40560->40561 40561->40563 40562->40563 40563->40535 40566 5565607 40564->40566 40565 5564630 9 API calls 40569 5566169 40565->40569 40567 5564630 9 API calls 40566->40567 40568 55661a7 40566->40568 40566->40569 40567->40569 40568->40547 40569->40565 40569->40568 40861 55699c8 40862 55699c9 40861->40862 40865 5569a43 40862->40865 40866 5569068 40862->40866 40867 5569073 40866->40867 40868 5569a3c 40867->40868 40871 556b168 40867->40871 40878 556b159 40867->40878 40872 556b169 40871->40872 40885 5569d7c 40872->40885 40875 556b18f 40875->40868 40876 556b1b8 CreateIconFromResourceEx 40877 556b236 40876->40877 40877->40868 40879 556b15c 40878->40879 40880 5569d7c CreateIconFromResourceEx 40879->40880 40882 556b182 40880->40882 40881 556b18f 40881->40868 40882->40881 40883 556b1b8 CreateIconFromResourceEx 40882->40883 40884 556b236 40883->40884 40884->40868 40886 556b1b8 CreateIconFromResourceEx 40885->40886 40887 556b182 40886->40887 40887->40875 40887->40876 40888 556c388 40889 556c38d 40888->40889 40890 5564630 9 API calls 40889->40890 40891 556c398 40890->40891
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b5b87f81c8e0936aa25bc550c8d3c00711a910ce352362dd6b875a121ce5ca58
                                                            • Instruction ID: 311af92ab033d3bb2f48def2a39f35e73de114f34bc445337a4f255132776ac2
                                                            • Opcode Fuzzy Hash: b5b87f81c8e0936aa25bc550c8d3c00711a910ce352362dd6b875a121ce5ca58
                                                            • Instruction Fuzzy Hash: D5427B74B006068FDB59DF69C4A466EFBF2BF88311F14852EE55A97390DB30A902CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727087818.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_7fd0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 37643ca946d842b3ec7c1fb889336aecff1f5650bd60ae3c9360a53bc4b830c4
                                                            • Instruction ID: 9f8d4808138f327db54dc40b1da32e8b100f49b6e296a83520e095f5f1a254f4
                                                            • Opcode Fuzzy Hash: 37643ca946d842b3ec7c1fb889336aecff1f5650bd60ae3c9360a53bc4b830c4
                                                            • Instruction Fuzzy Hash: 4833C3B2F101268BCB656B6C445423EBAE7BBC9650F5C81AEDE06D7344EF70CC419B92

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1284 2fbbff0-2fbc00f 1285 2fbc03b-2fbc03f 1284->1285 1286 2fbc011-2fbc01e call 2fbaf60 1284->1286 1288 2fbc053-2fbc094 1285->1288 1289 2fbc041-2fbc04b 1285->1289 1291 2fbc020 1286->1291 1292 2fbc034 1286->1292 1295 2fbc0a1-2fbc0af 1288->1295 1296 2fbc096-2fbc09e 1288->1296 1289->1288 1339 2fbc026 call 2fbc689 1291->1339 1340 2fbc026 call 2fbc698 1291->1340 1292->1285 1297 2fbc0d3-2fbc0d5 1295->1297 1298 2fbc0b1-2fbc0b6 1295->1298 1296->1295 1303 2fbc0d8-2fbc0df 1297->1303 1300 2fbc0b8-2fbc0bf call 2fbaf6c 1298->1300 1301 2fbc0c1 1298->1301 1299 2fbc02c-2fbc02e 1299->1292 1302 2fbc170-2fbc230 1299->1302 1305 2fbc0c3-2fbc0d1 1300->1305 1301->1305 1334 2fbc238-2fbc263 GetModuleHandleW 1302->1334 1335 2fbc232-2fbc235 1302->1335 1306 2fbc0ec-2fbc0f3 1303->1306 1307 2fbc0e1-2fbc0e9 1303->1307 1305->1303 1309 2fbc100-2fbc109 call 2fbaf7c 1306->1309 1310 2fbc0f5-2fbc0fd 1306->1310 1307->1306 1315 2fbc10b-2fbc113 1309->1315 1316 2fbc116-2fbc11b 1309->1316 1310->1309 1315->1316 1317 2fbc139-2fbc146 1316->1317 1318 2fbc11d-2fbc124 1316->1318 1325 2fbc169-2fbc16f 1317->1325 1326 2fbc148-2fbc166 1317->1326 1318->1317 1320 2fbc126-2fbc136 call 2fbaf8c call 2fbaf9c 1318->1320 1320->1317 1326->1325 1336 2fbc26c-2fbc280 1334->1336 1337 2fbc265-2fbc26b 1334->1337 1335->1334 1337->1336 1339->1299 1340->1299
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 02FBC256
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4700215175.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2fb0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: d5f34ecc58a9447cb180ade62e0521a035658aa6315097c2be436a01b5006134
                                                            • Instruction ID: f39ba0d6b1bb910ee1ca5409088f021c2ccaa0df51e39c9a90780f04d437dddd
                                                            • Opcode Fuzzy Hash: d5f34ecc58a9447cb180ade62e0521a035658aa6315097c2be436a01b5006134
                                                            • Instruction Fuzzy Hash: B28147B0A00B058FE725DF6AC44479BBBF1FF88644F00892ED586D7A50DB75E845CB90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1341 556c90c-556e161 1345 556e163-556e16c 1341->1345 1346 556e16e 1341->1346 1347 556e170-556e175 1345->1347 1346->1347 1348 556e177-556e194 1347->1348 1349 556e195-556e22a 1347->1349 1356 556e236-556e266 EnumThreadWindows 1349->1356 1357 556e22c-556e234 1349->1357 1358 556e26f-556e29c 1356->1358 1359 556e268-556e26e 1356->1359 1357->1356 1359->1358
                                                            APIs
                                                            • EnumThreadWindows.USER32(?,00000000,?), ref: 0556E259
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4714637345.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_5560000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: EnumThreadWindows
                                                            • String ID:
                                                            • API String ID: 2941952884-0
                                                            • Opcode ID: fd6d38625cc70ea471d00aade89f48a1382f63acba1f1aa7e4bcb7f011a7d045
                                                            • Instruction ID: 4aa6a8daa0c255bbd9052483435a3202ca5aa288d42613f7550dc31b0a5b8ccb
                                                            • Opcode Fuzzy Hash: fd6d38625cc70ea471d00aade89f48a1382f63acba1f1aa7e4bcb7f011a7d045
                                                            • Instruction Fuzzy Hash: 6241D071A05245DFEB14CF99C845BEEBBFAFF88320F14842AD419A7340CB789805CBA4

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1363 5562b64-556438c 1368 5564392-5564397 1363->1368 1369 556443c-556445c 1363->1369 1370 55643ea-5564422 CallWindowProcW 1368->1370 1371 5564399-55643d0 1368->1371 1376 556445f-556446c 1369->1376 1372 5564424-556442a 1370->1372 1373 556442b-556443a 1370->1373 1377 55643d2-55643d8 1371->1377 1378 55643d9-55643e8 1371->1378 1372->1373 1373->1376 1377->1378 1378->1376
                                                            APIs
                                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 05564411
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4714637345.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_5560000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: CallProcWindow
                                                            • String ID:
                                                            • API String ID: 2714655100-0
                                                            • Opcode ID: fce9de6e6d38a5fc3fc8191cca65db14c07db2d9c6516ed342ed157ade4ae29e
                                                            • Instruction ID: 006feba27dd2837c712c5de8ac780fd5f11a640042648cc53b931325a1595c6d
                                                            • Opcode Fuzzy Hash: fce9de6e6d38a5fc3fc8191cca65db14c07db2d9c6516ed342ed157ade4ae29e
                                                            • Instruction Fuzzy Hash: 48412AB5900245CFDB14CF99C489AAABBF5FF88314F24C459D519AB321D775A841CFA0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1381 2fb6414-2fb7431 CreateActCtxA 1384 2fb743a-2fb7494 1381->1384 1385 2fb7433-2fb7439 1381->1385 1392 2fb74a3-2fb74a7 1384->1392 1393 2fb7496-2fb7499 1384->1393 1385->1384 1394 2fb74a9-2fb74b5 1392->1394 1395 2fb74b8 1392->1395 1393->1392 1394->1395 1396 2fb74b9 1395->1396 1396->1396
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 02FB7421
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4700215175.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2fb0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 568fb5485abe87871feb4b24dbc015ccb07f0d3565b5bd15ba52e484256535a1
                                                            • Instruction ID: 3d4f614f071abeef9d9be98372b3ca19ebd994d235a5993f0945956b8fe161ef
                                                            • Opcode Fuzzy Hash: 568fb5485abe87871feb4b24dbc015ccb07f0d3565b5bd15ba52e484256535a1
                                                            • Instruction Fuzzy Hash: 1441CF71C0061DCBEB25DFAAC944BDEBBB5BF88305F20806AD508AB251DBB56945CF90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1398 2fb7364-2fb7431 CreateActCtxA 1400 2fb743a-2fb7494 1398->1400 1401 2fb7433-2fb7439 1398->1401 1408 2fb74a3-2fb74a7 1400->1408 1409 2fb7496-2fb7499 1400->1409 1401->1400 1410 2fb74a9-2fb74b5 1408->1410 1411 2fb74b8 1408->1411 1409->1408 1410->1411 1412 2fb74b9 1411->1412 1412->1412
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 02FB7421
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4700215175.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2fb0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 2369d46e0a8e8d7b38988e6a13dd0df4b58b12fd11958fde2df963193cd9047a
                                                            • Instruction ID: ac62f61c76a3a75945a397086db1dbc4890e5931c29572a4ee1cb3b5bcf87134
                                                            • Opcode Fuzzy Hash: 2369d46e0a8e8d7b38988e6a13dd0df4b58b12fd11958fde2df963193cd9047a
                                                            • Instruction Fuzzy Hash: A341D2B1C00719CBEB25DFA9CA44BDDFBB5BF88305F20805AD508AB251DB756945CF90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1414 5565a6c-556b4ac 1418 556b4b2-556b4f1 1414->1418 1419 556b4ae-556b4b1 1414->1419 1426 556b565-556b573 1418->1426 1427 556b4f3-556b514 call 5564630 call 5569dc0 1418->1427 1429 556b575-556b578 1426->1429 1430 556b57d-556b59a SendMessageW 1426->1430 1437 556b519-556b51c 1427->1437 1429->1430 1432 556b5a3-556b5b7 1430->1432 1433 556b59c-556b5a2 1430->1433 1433->1432
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4714637345.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_5560000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5fd9f15aa7866c39f1e3f5627e7695d3cf2484b4fcec1131bea3a18f3f560f86
                                                            • Instruction ID: 703010124f4d7bb7929150f61210472c22e396a94f286919f26185ab93d67093
                                                            • Opcode Fuzzy Hash: 5fd9f15aa7866c39f1e3f5627e7695d3cf2484b4fcec1131bea3a18f3f560f86
                                                            • Instruction Fuzzy Hash: 24213572A043489FCB109B69D844BEEBFF9FF95320F14809AE508D7261CA349845C7A0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1438 556b168-556b18d call 5569d7c 1442 556b1a2-556b234 CreateIconFromResourceEx 1438->1442 1443 556b18f-556b19f call 556ac28 1438->1443 1448 556b236-556b23c 1442->1448 1449 556b23d-556b25a 1442->1449 1448->1449
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4714637345.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_5560000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: CreateFromIconResource
                                                            • String ID:
                                                            • API String ID: 3668623891-0
                                                            • Opcode ID: 4cfaab7ba97f7b09dde937503128d7e64156333c5760e54eb39b9b6af2708cc8
                                                            • Instruction ID: 6e6c972643727f1242fc6953fabcd5ea2b1422c482a65f65653930168db7e419
                                                            • Opcode Fuzzy Hash: 4cfaab7ba97f7b09dde937503128d7e64156333c5760e54eb39b9b6af2708cc8
                                                            • Instruction Fuzzy Hash: C8319C71904389DFDB11DFA9D844AEEBFF4FF49220F14805AE554A7221C375A854CBA0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1452 2fb611c-2fb681c DuplicateHandle 1455 2fb681e-2fb6824 1452->1455 1456 2fb6825-2fb6842 1452->1456 1455->1456
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02FB674E,?,?,?,?,?), ref: 02FB680F
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4700215175.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2fb0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: b11e79a451b71df7892e5b91715927812bbc37ccbb993923c9b64bb3e3b0381b
                                                            • Instruction ID: 50e344da536e5d07687b4a990bd0a694d73126d1ded93f44df7cda591ec42f2b
                                                            • Opcode Fuzzy Hash: b11e79a451b71df7892e5b91715927812bbc37ccbb993923c9b64bb3e3b0381b
                                                            • Instruction Fuzzy Hash: FD21D4B5904249DFDB10CF9AD984ADEBBF8FF48320F14845AE914A7210D374A950CFA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1459 2fb6780-2fb6781 1460 2fb6783-2fb67cd 1459->1460 1461 2fb67d0-2fb681c DuplicateHandle 1459->1461 1460->1461 1462 2fb681e-2fb6824 1461->1462 1463 2fb6825-2fb6842 1461->1463 1462->1463
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02FB674E,?,?,?,?,?), ref: 02FB680F
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4700215175.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2fb0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 9eb3bbae27f9daca15af6d0134bd8d4cf96700caae7dab0d3e771c5e350cbe70
                                                            • Instruction ID: 7f5c0233402992b88cd79d2f2059da560a8c4ef370161d736c03b35fbc57a6db
                                                            • Opcode Fuzzy Hash: 9eb3bbae27f9daca15af6d0134bd8d4cf96700caae7dab0d3e771c5e350cbe70
                                                            • Instruction Fuzzy Hash: AF21D2B5D00249DFDB10CF9AD984AEEBBF8FF48324F14841AE914A7210D778A950CFA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1467 556c91c-556e22a 1469 556e236-556e266 EnumThreadWindows 1467->1469 1470 556e22c-556e234 1467->1470 1471 556e26f-556e29c 1469->1471 1472 556e268-556e26e 1469->1472 1470->1469 1472->1471
                                                            APIs
                                                            • EnumThreadWindows.USER32(?,00000000,?), ref: 0556E259
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4714637345.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_5560000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: EnumThreadWindows
                                                            • String ID:
                                                            • API String ID: 2941952884-0
                                                            • Opcode ID: 2606b403c20bc3229750b54ffb8e3a9fd167ac52a96d0db8f5786a84289f1ff7
                                                            • Instruction ID: 2c33bf88f5f27eaef688b4d1847cbe02265a273ece77f780f9f2cf68364d31f4
                                                            • Opcode Fuzzy Hash: 2606b403c20bc3229750b54ffb8e3a9fd167ac52a96d0db8f5786a84289f1ff7
                                                            • Instruction Fuzzy Hash: F7213875904249CFDB10CF9AC845BEEFBF9FB88320F14842AD415A7240D7B8A940CFA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1476 5569d7c-556b234 CreateIconFromResourceEx 1478 556b236-556b23c 1476->1478 1479 556b23d-556b25a 1476->1479 1478->1479
                                                            APIs
                                                            • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,0556B182,?,?,?,?,?), ref: 0556B227
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4714637345.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_5560000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: CreateFromIconResource
                                                            • String ID:
                                                            • API String ID: 3668623891-0
                                                            • Opcode ID: 5213d77c1f7bde4e978e1f9c83cbe2a83ce31362a537da7712e0dddc4b17e789
                                                            • Instruction ID: 08f7e4e27e97c7940df7ed2e4e415c08e308f482cd81d80cc8c1160edd2a9a62
                                                            • Opcode Fuzzy Hash: 5213d77c1f7bde4e978e1f9c83cbe2a83ce31362a537da7712e0dddc4b17e789
                                                            • Instruction Fuzzy Hash: 551126B1804249DFDB10CF9AD844BEEBFF8FB48320F14841AE914A7210C379A950CFA4

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1488 5562010-5562013 1489 5562018-5562082 SetWindowLongW 1488->1489 1490 5562084-556208a 1489->1490 1491 556208b-556209f 1489->1491 1490->1491
                                                            APIs
                                                            • SetWindowLongW.USER32(?,?,?), ref: 05562075
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4714637345.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_5560000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: LongWindow
                                                            • String ID:
                                                            • API String ID: 1378638983-0
                                                            • Opcode ID: cc2a3703b6e349f3a7ff09f09a289aed2231e6a14d4b9b06c568a1d0a20cae6e
                                                            • Instruction ID: 7baa6bd4969f7f25ea23697de25bf02ede2c3e7d1701e6576f23a09d357c53bb
                                                            • Opcode Fuzzy Hash: cc2a3703b6e349f3a7ff09f09a289aed2231e6a14d4b9b06c568a1d0a20cae6e
                                                            • Instruction Fuzzy Hash: A211F5B58002499FDB10CF9AD589BDEBBF8FB48320F20851AD919A7200C3B5A944CFA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1493 5569dc0-556b59a SendMessageW 1495 556b5a3-556b5b7 1493->1495 1496 556b59c-556b5a2 1493->1496 1496->1495
                                                            APIs
                                                            • SendMessageW.USER32(?,?,?,?), ref: 0556B58D
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4714637345.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_5560000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID:
                                                            • API String ID: 3850602802-0
                                                            • Opcode ID: 829bcae676d7359c3d2291d4104e1cdb4e804c0608d892e8578713b95f1c08ec
                                                            • Instruction ID: dff65bc83fb09bedaadf48a44161d0e9b155ac1115f81bf6d348517d0085ebaa
                                                            • Opcode Fuzzy Hash: 829bcae676d7359c3d2291d4104e1cdb4e804c0608d892e8578713b95f1c08ec
                                                            • Instruction Fuzzy Hash: 3611F5B5804349DFDB10DF99D545BDEBBF8FB58320F10845AE514A7200D3B5A954CFA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1482 2fbc1f0-2fbc230 1483 2fbc238-2fbc263 GetModuleHandleW 1482->1483 1484 2fbc232-2fbc235 1482->1484 1485 2fbc26c-2fbc280 1483->1485 1486 2fbc265-2fbc26b 1483->1486 1484->1483 1486->1485
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 02FBC256
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4700215175.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_2fb0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 973b6db039de1d8db477c274b563f73f93fb8a35a182fd40084cf02084943db9
                                                            • Instruction ID: dffc709546353c319873444db94b72a816d8687fe6d60a53d44ffb3e9a42d8db
                                                            • Opcode Fuzzy Hash: 973b6db039de1d8db477c274b563f73f93fb8a35a182fd40084cf02084943db9
                                                            • Instruction Fuzzy Hash: B81102B5C002498FDB10CF9AC544BDFFBF4AF88624F10855AD519A7200C3B9A545CFA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1498 556b52b-556b59a SendMessageW 1500 556b5a3-556b5b7 1498->1500 1501 556b59c-556b5a2 1498->1501 1501->1500
                                                            APIs
                                                            • SendMessageW.USER32(?,?,?,?), ref: 0556B58D
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4714637345.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_5560000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID:
                                                            • API String ID: 3850602802-0
                                                            • Opcode ID: 8c48e8900d71d729ec8846e507c142d8a3beacbda841aec86a74e960c69547b0
                                                            • Instruction ID: 6ff0355ceda845e652640c45125141bd55648a53e0d156ff5d85068e73b32347
                                                            • Opcode Fuzzy Hash: 8c48e8900d71d729ec8846e507c142d8a3beacbda841aec86a74e960c69547b0
                                                            • Instruction Fuzzy Hash: E011F2B5800349DFDB10CF9AC985BDEBBF8FB48324F208419E918A7200D3B5A944CFA1
                                                            APIs
                                                            • SetWindowLongW.USER32(?,?,?), ref: 05562075
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4714637345.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_5560000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: LongWindow
                                                            • String ID:
                                                            • API String ID: 1378638983-0
                                                            • Opcode ID: 5dac81a786aa9b72496f2a7812519f11103cf27eaee53cc8f3a4837c6f510520
                                                            • Instruction ID: 13314fec035ee6e460f7eae38cbea1a09572eb9235b1495f8158e6e4c40d4aa9
                                                            • Opcode Fuzzy Hash: 5dac81a786aa9b72496f2a7812519f11103cf27eaee53cc8f3a4837c6f510520
                                                            • Instruction Fuzzy Hash: C91103B5800249CFDB10CF9AC585BDEBBF8FB48320F20841AD919A7200C3B9A944CFA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727087818.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_7fd0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: U
                                                            • API String ID: 0-3372436214
                                                            • Opcode ID: 11c579bef802c6a439b152f368700a3b25e61dddcdd12616b7594fe47a53db4d
                                                            • Instruction ID: d0722bbf7558aabb456b640855e0ff0c9d5350f4ca41c3f386f47e40338a2e08
                                                            • Opcode Fuzzy Hash: 11c579bef802c6a439b152f368700a3b25e61dddcdd12616b7594fe47a53db4d
                                                            • Instruction Fuzzy Hash: A3018972A042948BD72617688C1497EBFB7EB82240F0D06BACD85A7240DB358C01C7E2
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727087818.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_7fd0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 36296b59b287c082a309d3e9d5c18b0c4778f69e2c52bbf9ecfa1844b4dc2c8b
                                                            • Instruction ID: 767626c3a3937da890a9b67bf5c8d37aff5c887e9bba7147034129733ec73e65
                                                            • Opcode Fuzzy Hash: 36296b59b287c082a309d3e9d5c18b0c4778f69e2c52bbf9ecfa1844b4dc2c8b
                                                            • Instruction Fuzzy Hash: 03A29374A102158FE7149F69C8597BABABBBFD5310F14806EEA0697294DFB08D40CF63
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5ad854215c6f210bf00e81e9584cbf849c0bcec6ed37d81a4ef7297dc371b939
                                                            • Instruction ID: 06adc16de21b95a6e7adb3b928af92ab4a949e3ebc95225f28cb0f2f6f28d264
                                                            • Opcode Fuzzy Hash: 5ad854215c6f210bf00e81e9584cbf849c0bcec6ed37d81a4ef7297dc371b939
                                                            • Instruction Fuzzy Hash: BF122D34A002198FDB55EF68C894B9DB7B2BF89301F5085A9E449AB3A5DF30ED85CF50
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 152538408221e89ed06cab6f75dc8a8ad6282ffcb51f42a7b1eb708449c92948
                                                            • Instruction ID: af8a3eaa22cfed824cd64696fd8039ba850800135e887900f71071f446bf6ae8
                                                            • Opcode Fuzzy Hash: 152538408221e89ed06cab6f75dc8a8ad6282ffcb51f42a7b1eb708449c92948
                                                            • Instruction Fuzzy Hash: F8E1DF30604605CFEB15DBACD49466EBBE3FF85216F588A1AD446CB796CB30E802CF95
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727087818.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_7fd0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e0c4f504b1db4410b5de75259ca8c67ec25a07864ae7362c7f447a6cb584ecc5
                                                            • Instruction ID: b7d676daf00fd41ff369d8204fd80ce645114d30c66588f1249a89eda3c56bfe
                                                            • Opcode Fuzzy Hash: e0c4f504b1db4410b5de75259ca8c67ec25a07864ae7362c7f447a6cb584ecc5
                                                            • Instruction Fuzzy Hash: 7EE1B1B0B002069FEB14CB69C948A6EBBB3FFC5300F188169E5029B391DF79DD419B51
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6f60d75d134b47080e91cee8d5cfeca5d867422b2f4cb9f4c185e19b939ecb43
                                                            • Instruction ID: 4659227805e5f33b10640b32f44a2c007bdd939eda09e2e8f76be55a9778222f
                                                            • Opcode Fuzzy Hash: 6f60d75d134b47080e91cee8d5cfeca5d867422b2f4cb9f4c185e19b939ecb43
                                                            • Instruction Fuzzy Hash: 4AE14F34A01209DFDB55EFA8D4949ADBBB2FF89310F108569E405AB3A4DB30ED46CB90
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1ca70fc0b08c247f29e6d52db465210447d446ef6438d50d0c8fd050029a0c63
                                                            • Instruction ID: 4e33ed101b22026e5904359b3a1fc31fb06ad551a8b7edff398d1bd2059ff3de
                                                            • Opcode Fuzzy Hash: 1ca70fc0b08c247f29e6d52db465210447d446ef6438d50d0c8fd050029a0c63
                                                            • Instruction Fuzzy Hash: DAC17175A006418FE725CB28C465B6EBBF3BF84322F19855DE4868B6A1CB34E842CF51
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 87a088322500a6b1c48cea738c7c805dd4bd3d97db53c1cef1d54c948961e8b0
                                                            • Instruction ID: d8dafd6024d56bfeeec071e29ac39c96092c94004371474c7fee600f47aa6649
                                                            • Opcode Fuzzy Hash: 87a088322500a6b1c48cea738c7c805dd4bd3d97db53c1cef1d54c948961e8b0
                                                            • Instruction Fuzzy Hash: 93D1C834B112189FDB44EFA9D994E9EBBB3FF89700F208459E515AB3A5CE71AC01CB50
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1381cd6f0900bec561ed328a9f871b69d11e004eaf750a730910534bde153584
                                                            • Instruction ID: 40bae5c416c8724e76f47d421be495ef445e6afd6681ff4451e5f3f814011ce1
                                                            • Opcode Fuzzy Hash: 1381cd6f0900bec561ed328a9f871b69d11e004eaf750a730910534bde153584
                                                            • Instruction Fuzzy Hash: BEC1C474A00218DFDB44EFA8C994E9EB7B6FF88300F104569E506AB3A5DB71AC02CF51
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 496105f03b1440c018273bab0e80fa769ba69378b870a2359b882d8c8f8e7503
                                                            • Instruction ID: 6d88244b7e2031ff47cb5f221db32de271d147cb914d072457e7e75d2e02b1d1
                                                            • Opcode Fuzzy Hash: 496105f03b1440c018273bab0e80fa769ba69378b870a2359b882d8c8f8e7503
                                                            • Instruction Fuzzy Hash: 8DA1A236301200DFD71A9F68D894F2A7BA3EFC9311F1584A9E2058B3A1DB36EC42DB51
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 71eafaae180b33ebd325e37440e8e9b610094809050e20b2e42809d5235ec450
                                                            • Instruction ID: 4d4e8bc10c112d107621f109160ce0b6d1526c24cbdba7db05c62ad210aaa7b9
                                                            • Opcode Fuzzy Hash: 71eafaae180b33ebd325e37440e8e9b610094809050e20b2e42809d5235ec450
                                                            • Instruction Fuzzy Hash: 7AC1C474B00218DFDB44EFA8C994E9EB7B6BF88301F104569E506AB3A5DB71AC02CF50
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 66b138a3c012e4beb01f51c71bf889f12b5f605cea41567c986bd955bc2c24c0
                                                            • Instruction ID: dee297f5c51d95a29f3a07db056c18d10e6554e01a30faca6181839da20181a1
                                                            • Opcode Fuzzy Hash: 66b138a3c012e4beb01f51c71bf889f12b5f605cea41567c986bd955bc2c24c0
                                                            • Instruction Fuzzy Hash: 9AB10D34B112189FDB44DFA8D994E9EBBB3FF89300F144069E505AB3A5DB71AC41CB90
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 55b47929a3eb3ea82c971d51e9c7c253389e1cd9de651e2bbd28337a58425a31
                                                            • Instruction ID: 9d3072a33cf47583afd77b31bde2015ca0f0b6f0193fea2455fbe0d5d8e35d56
                                                            • Opcode Fuzzy Hash: 55b47929a3eb3ea82c971d51e9c7c253389e1cd9de651e2bbd28337a58425a31
                                                            • Instruction Fuzzy Hash: 04A17C347006188FDB44EF68C854AAE7BB3AFC9700F104969E5129B3A4DF75AD42CF91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2f6491741c9b062bae42194f94f07dfc1f77751569eed22b71595beae28c9977
                                                            • Instruction ID: 9da09edba5ee02596e568efc1218b825aeee03eef3f6727247e38af9b7a703db
                                                            • Opcode Fuzzy Hash: 2f6491741c9b062bae42194f94f07dfc1f77751569eed22b71595beae28c9977
                                                            • Instruction Fuzzy Hash: 9FA15A347006188FDB44EF68C854AAE7BB3AFC9700F504969E5129B3A4DF75AD42CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727087818.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_7fd0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 581e7d7a6e0e735c00a84b71c0c6032d0f286f41c33656a7c0283bf479729995
                                                            • Instruction ID: 21b60cb4921161f0b294de77b60cc16c7d62d1702be1c18c5a39df42649cb36f
                                                            • Opcode Fuzzy Hash: 581e7d7a6e0e735c00a84b71c0c6032d0f286f41c33656a7c0283bf479729995
                                                            • Instruction Fuzzy Hash: 4A91D0B1B406029FDB058B28C844B6EBBB7FFC6604F18416AE111DB3A2DF79CD449B91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f3aee8a67afc6df7b7db6eedf2d329711e70de105764c225ceb1610e3f31d87b
                                                            • Instruction ID: be2a14252b2f27a6dfe8987231fc4b37884ce87dbf42d0b03c56e1579abad066
                                                            • Opcode Fuzzy Hash: f3aee8a67afc6df7b7db6eedf2d329711e70de105764c225ceb1610e3f31d87b
                                                            • Instruction Fuzzy Hash: 1C815B34B10614DFDB45DF68C894AADBBB6AF89711F1580A9E506DB3A5CF30EC02CB90
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ca89ec00d4663adfa48f1cdf1770cc21700157cf7cfd00b88399430c568b6756
                                                            • Instruction ID: 11e9f730ddbae6d6329da4469e60d9c724b577639311e76ad6f42fcd47b84b80
                                                            • Opcode Fuzzy Hash: ca89ec00d4663adfa48f1cdf1770cc21700157cf7cfd00b88399430c568b6756
                                                            • Instruction Fuzzy Hash: 2D71BF71B006158FC754EB68C554A6EBBF6EFCA700B10416AE506DB3A1DF30AD06CBA2
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 18e10838c86600d0ba36cd3a0f42481d4c6d17add449dbc8c36ca821aec68f72
                                                            • Instruction ID: 65d2c522dcb215f8e2a1cd28d47a7e5c8b61a4d2bbd042961e1f27c4f3401453
                                                            • Opcode Fuzzy Hash: 18e10838c86600d0ba36cd3a0f42481d4c6d17add449dbc8c36ca821aec68f72
                                                            • Instruction Fuzzy Hash: D9812D34B006199BEB55EF68D854BAE77B3EF88601F204529E402AB3D0DF75AD41CF91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 21c7c0e4b3b46d6bd2fc5d80d58904a5efa142877627e7b6d28df11bea723103
                                                            • Instruction ID: 7c3da5eaeb340e78221af12037233509711fc548db62b72fbaa50582c69cbb7a
                                                            • Opcode Fuzzy Hash: 21c7c0e4b3b46d6bd2fc5d80d58904a5efa142877627e7b6d28df11bea723103
                                                            • Instruction Fuzzy Hash: 85717D347106188FDB44EF68C890AAE77B3AFC9701F504969E5029B3A4DF75ED42CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 64831b0e6c168b0996ebce8f802cae9666344c3cddbd937c870585e459168ce8
                                                            • Instruction ID: 7ea253b8376c0932a968c6995a0fd60fae44d30a1e467ae3122baa6657dba525
                                                            • Opcode Fuzzy Hash: 64831b0e6c168b0996ebce8f802cae9666344c3cddbd937c870585e459168ce8
                                                            • Instruction Fuzzy Hash: 4C81A074B21229AFDB54CB9CD984EAEB7B2BF88310F154159E905AB3A2D771EC41CF40
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2a345c99099a55eb6939097c229fff7a1e810df072b4092f4133100cdf66e8f5
                                                            • Instruction ID: e1fed5f3ea3273d054864e2e4e800914487afa08a0fee062b01eb774957a44f5
                                                            • Opcode Fuzzy Hash: 2a345c99099a55eb6939097c229fff7a1e810df072b4092f4133100cdf66e8f5
                                                            • Instruction Fuzzy Hash: 22618034B016099FEB15DB68D854BAE7BB3AF88201F144429D402AB3D1DF74AD42CF95
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 22107e626b12c215d7e331b3ce27fed8586129b61efa123597611e93f490d064
                                                            • Instruction ID: d2bda8c4fac7051f6586a4bea2d25a70135e6efaa12d206c460c411246eb1af7
                                                            • Opcode Fuzzy Hash: 22107e626b12c215d7e331b3ce27fed8586129b61efa123597611e93f490d064
                                                            • Instruction Fuzzy Hash: 2151BF713007518FE724DF2AC880B5B7BE2EF85721F14892EE55A8B7A1DB74DC058B91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cac76fcea222726be01bac707b0c5b7fe47b145dc5fda254790f5fb43415cc12
                                                            • Instruction ID: 193aa30446ad4a247319dd0a6463fbc547361c4eb8c9fcf9dee1cc88597ea3ea
                                                            • Opcode Fuzzy Hash: cac76fcea222726be01bac707b0c5b7fe47b145dc5fda254790f5fb43415cc12
                                                            • Instruction Fuzzy Hash: 10415B71B082905FE716AB288C69BAE7FA79FD6701F14005EE142DF3D2DEA54C06CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b7557e6472eb40f319f7b80f3b40751185e66114a7f5a25cec6742a068715496
                                                            • Instruction ID: 5f9c985cf37f9bf866e5c5e459091acffadd95fe98e99d47d52304c5357a4031
                                                            • Opcode Fuzzy Hash: b7557e6472eb40f319f7b80f3b40751185e66114a7f5a25cec6742a068715496
                                                            • Instruction Fuzzy Hash: 3C613A34B10614DFDB45DF68C894AADB7B6BF88711F1580A9E8069B3A5DB30EC02CF90
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 442d72bee065b4d9c4161de0f44db3156378bf194cfac77114f0196fafc23c00
                                                            • Instruction ID: a725cc84d25af4e5bd25ffed94a840beca8a618e721b04691f48687abfcec647
                                                            • Opcode Fuzzy Hash: 442d72bee065b4d9c4161de0f44db3156378bf194cfac77114f0196fafc23c00
                                                            • Instruction Fuzzy Hash: B041D4327001596FDF029EEA9C508FFBBEAEF88211F04406AFA05D3251DA39D9159BB1
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3364820340b8859d7d54649928a58d8a62fcd04fd7c4f4c6aa6a3b411e0e217d
                                                            • Instruction ID: 1182c00202a76a5b89c0a337206405b715d45e21292fa727373c3578bcf9150b
                                                            • Opcode Fuzzy Hash: 3364820340b8859d7d54649928a58d8a62fcd04fd7c4f4c6aa6a3b411e0e217d
                                                            • Instruction Fuzzy Hash: 3141B930B106148FCB45EB68C8A4AADB7BBEFC9700F10441EE102AB7A4CF749C46CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a692523b21d9a9bd3513ac9c087cc728c4ef6f8affa78457ca9756f318d4e430
                                                            • Instruction ID: 2177854c58bf30f9ce150a7880c273a76b30e218591e433638ee7aec0571c7a3
                                                            • Opcode Fuzzy Hash: a692523b21d9a9bd3513ac9c087cc728c4ef6f8affa78457ca9756f318d4e430
                                                            • Instruction Fuzzy Hash: D341AC31B00B058FDB64DB6CD55029EB7F2EF84621F54896ED05ACBA84DB30E801CF81
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8cb456867a7239524982c6fe74656a7478da65c3f1f1370ae2dbc1fa93b38287
                                                            • Instruction ID: 3505e73112b26a3a3ca7e2fc1083031d5d203530b2e6b5511f2055e78cf75f41
                                                            • Opcode Fuzzy Hash: 8cb456867a7239524982c6fe74656a7478da65c3f1f1370ae2dbc1fa93b38287
                                                            • Instruction Fuzzy Hash: 88417931B002158FD744DF69C854A9EBBF6BFCD210B2585AAE509EB3A1DB31AC01CB80
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a8311df096ad7712459924c4bfd24ccbcceecd56428e91e6e4a6bc927cac7075
                                                            • Instruction ID: 5a9e62a84faea157b767c61d004ba4e2769f701129c5769c8128fb117c158755
                                                            • Opcode Fuzzy Hash: a8311df096ad7712459924c4bfd24ccbcceecd56428e91e6e4a6bc927cac7075
                                                            • Instruction Fuzzy Hash: 0A415C727006049FE3599B68C854F2A7BA7AFC8711F114469E2068B7E6DF75EC02CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2abdc5d043c114f8e18173d0d6d68798688dca447803ef052ea7e2ed23cb70c3
                                                            • Instruction ID: d989a395d93a102cfacb5db4456296409145d32e05e22ab718a45895cc1b1858
                                                            • Opcode Fuzzy Hash: 2abdc5d043c114f8e18173d0d6d68798688dca447803ef052ea7e2ed23cb70c3
                                                            • Instruction Fuzzy Hash: C43149357006149FE358DB69C854F2B7BEAAFC8710F204468E60A8B3A1DF75EC02CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5f2ab650b5363d135ed4c7ea11e6673c4c556d199fd9717798a8633adf1c4be9
                                                            • Instruction ID: d4608038f51a9bb061ff25e4165e8c2c5491e058fc9007c8c3319cb6ddd74995
                                                            • Opcode Fuzzy Hash: 5f2ab650b5363d135ed4c7ea11e6673c4c556d199fd9717798a8633adf1c4be9
                                                            • Instruction Fuzzy Hash: A341A034B106188FDB44EF68C8556AE7BB6AFC9601F10855BE402EB3A1DF709D06CFA1
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dc6f664e276d26e5587881796fecf6dbbe311f704bb52fd89e1f66381a5a93ca
                                                            • Instruction ID: 31e7e2dad49279c20bc19de6b2c1c2f15b783c46868e7545231b5f88121bbf6b
                                                            • Opcode Fuzzy Hash: dc6f664e276d26e5587881796fecf6dbbe311f704bb52fd89e1f66381a5a93ca
                                                            • Instruction Fuzzy Hash: 96313C35A001189BDF54DFA8D854AEEB7B6FF88312F108069E901B73A4CB75AD05CFA0
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0f35da84c91d3b5d2cd910a8fd98d8361f0c76e34088ff0ed5a598a04672ee4a
                                                            • Instruction ID: 686fee3288576d6df49a8a41ed892fbc2925dda40d8a56ba3b3ef0e96d2e7958
                                                            • Opcode Fuzzy Hash: 0f35da84c91d3b5d2cd910a8fd98d8361f0c76e34088ff0ed5a598a04672ee4a
                                                            • Instruction Fuzzy Hash: 9A318634B105188FCB44EF68C855A6EBBB6EFC9701F10855AE5069B3A4DF70AD06CBE1
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4699267498.000000000148D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_148d000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 261fd049525eba4bfca5aec5422b6ddbf3fe9f73a8b3c79dcbe6d03fc538206d
                                                            • Instruction ID: 53b1ef8e831cc71e725215d20c5ead49e7296add6c5bd613acd21ffc8cd48170
                                                            • Opcode Fuzzy Hash: 261fd049525eba4bfca5aec5422b6ddbf3fe9f73a8b3c79dcbe6d03fc538206d
                                                            • Instruction Fuzzy Hash: EF2145B1904300EFDB15EF54D9C0B2ABB61FB85318F20C56ED90A0B3A2C336C407CA61
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9fe5cc760e21174f9e699658e9ab134a8dbe4afcbc830a595b95c5a8484912b5
                                                            • Instruction ID: 784175a9086a5c4d1368020e773d56fb37d1acd6fd3baad01d17f4714ed649f1
                                                            • Opcode Fuzzy Hash: 9fe5cc760e21174f9e699658e9ab134a8dbe4afcbc830a595b95c5a8484912b5
                                                            • Instruction Fuzzy Hash: 72217A35A002189FDB149FA8C854ADE7FB7EB8C320F14912AE815AB390DB349841CFA1
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727087818.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_7fd0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e434cf2f385163d0e13753ab00362d3f15dcd67d8d35f270ce07600f2457eff0
                                                            • Instruction ID: 7aef21eccc06a1b84b3ab5766be79831c82c97a533c8da92ca9cbaa9ac974239
                                                            • Opcode Fuzzy Hash: e434cf2f385163d0e13753ab00362d3f15dcd67d8d35f270ce07600f2457eff0
                                                            • Instruction Fuzzy Hash: AF21BDB1B4010ADFEB109B64C884BAABBB3FBD4314F188129E4059B391CB35DC81DB61
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1bc4eb7f2aec964e9191c43dd918ce0708e6435737d555504777ebb9d408ce6f
                                                            • Instruction ID: e53df1becffd24cabc8c61925c2c9aea96816009a60cdbf729afdf4aeaf75436
                                                            • Opcode Fuzzy Hash: 1bc4eb7f2aec964e9191c43dd918ce0708e6435737d555504777ebb9d408ce6f
                                                            • Instruction Fuzzy Hash: 2E216A35A002189FDB149FA8C8549EE7FB6FB8C320F14912AE811AB390DF719841CFA1
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727087818.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_7fd0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cea3b78c6e61b25eeb15e0b606eca836cdc5d9e1d6a153d977e6eb0b35079d59
                                                            • Instruction ID: 080716055d6e0a394390939f8c75307b392e89795b543a949eb31a2651e146ac
                                                            • Opcode Fuzzy Hash: cea3b78c6e61b25eeb15e0b606eca836cdc5d9e1d6a153d977e6eb0b35079d59
                                                            • Instruction Fuzzy Hash: 1411E9BAB009928B871A5B3A501543DF6ABAFD656172C806EDC0AC7348EF31DC064B67
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e77cabd22eabfd96758e054695a4125add9e1ca57c74126512180852c95105cb
                                                            • Instruction ID: a214a4ea68c48d33bc7aad043ba4fc15c25313ccd57762227f09c4d664cc934e
                                                            • Opcode Fuzzy Hash: e77cabd22eabfd96758e054695a4125add9e1ca57c74126512180852c95105cb
                                                            • Instruction Fuzzy Hash: 25113DB62493809FD3069B34892475A7B72EF92300F5640EFC1418F7E3D63AD842C716
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 90df916ea49a4c8afcfc935253e71f0cf4928c3de55006ac9f454e4e5027870d
                                                            • Instruction ID: 096a43cccfbecd4f9adbcd59cc9ade0d5efb505bffc7c1647c6c1d63e0234e42
                                                            • Opcode Fuzzy Hash: 90df916ea49a4c8afcfc935253e71f0cf4928c3de55006ac9f454e4e5027870d
                                                            • Instruction Fuzzy Hash: 3821E175B102048FCB55DF68D994A6EBBF2AFC9311F14456AE502DB3A1DB30EC05CB62
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4699267498.000000000148D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_148d000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: aa8e2305b30127b34b7c3ac2bffb3729ad904fd099f6d8b785c3e02936b61392
                                                            • Instruction ID: 419414a4c22c9fa8011fd65113716103da08bd822e8a7e778ca9fde5316c1a91
                                                            • Opcode Fuzzy Hash: aa8e2305b30127b34b7c3ac2bffb3729ad904fd099f6d8b785c3e02936b61392
                                                            • Instruction Fuzzy Hash: 242180755093848FDB02DF64D590716BF71EB46218F28C5DBD8498B2A7C33A980BCB62
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ef62ed1a0daf8c2260045f428a0c22121fc62c40652b1a88fb0a9bff8e8f3507
                                                            • Instruction ID: 0482e227c16402980bd3d81f2e8b572229f5bd1dbb9b924ab9385ba0b7962a31
                                                            • Opcode Fuzzy Hash: ef62ed1a0daf8c2260045f428a0c22121fc62c40652b1a88fb0a9bff8e8f3507
                                                            • Instruction Fuzzy Hash: 87118B34B106048FCB54EF68D994A6EB7F6EFC9310F144569E5069B3A0DB70ED05CBA1
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b63567db5f14a526fb592f307c8bb61365f149bccad7380c279b041f90740d82
                                                            • Instruction ID: 45d1ebf2b7874663eb8a0d51c56a66c777e1b4bb9d133b47268234d116695f03
                                                            • Opcode Fuzzy Hash: b63567db5f14a526fb592f307c8bb61365f149bccad7380c279b041f90740d82
                                                            • Instruction Fuzzy Hash: 7B018435E006099FCB11DF6DD5049DEBBF6BF89621F00815AE449A7350EB349A05CFA1
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 22a8a4c88b2acc60115a2d5aa2c2e5d11b0daf976adbbb189fceedf4ec41bb11
                                                            • Instruction ID: 7d0d1f426120f5e9cf7a51a5142c7b02b915c3fccaa9495cb33acaab89bdcb32
                                                            • Opcode Fuzzy Hash: 22a8a4c88b2acc60115a2d5aa2c2e5d11b0daf976adbbb189fceedf4ec41bb11
                                                            • Instruction Fuzzy Hash: 7D110634B12229DFCB55CBA8D894EADBBB2BF48221F150159E512AB3A2CB759C41CB40
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 734078369de626af049e04f69ff9d00cacc153f1ebbb36a8fdf1d90e8a730107
                                                            • Instruction ID: d41aff2c1c81fef0f6cc16b6169447819602a235a7806b38d735978235656530
                                                            • Opcode Fuzzy Hash: 734078369de626af049e04f69ff9d00cacc153f1ebbb36a8fdf1d90e8a730107
                                                            • Instruction Fuzzy Hash: 2401C0317006409FD3269B28D454B2BBBA3ABC5221F14896DE5164B7E1CB71EC42DB81
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 85c9d2afc46178e318ece72ec5efc5073964293149ece99e3668b3f2c6686e38
                                                            • Instruction ID: cac1dea66ec661d10bcafa0ac700725fad44000d883bd76845dd958cf49eeedb
                                                            • Opcode Fuzzy Hash: 85c9d2afc46178e318ece72ec5efc5073964293149ece99e3668b3f2c6686e38
                                                            • Instruction Fuzzy Hash: F601B134700644AFE3269B28D454E2BBBA3EBC5321F14896CE5564B7E0CF75EC02DB80
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727087818.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_7fd0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5910ee63dd23546495a139764682bba2e14706013c619d736297fec54aadc69f
                                                            • Instruction ID: ca24610fb63b3fd10b041831b5e01d5c244e05d80bf5b10f02e6bee3686a4c83
                                                            • Opcode Fuzzy Hash: 5910ee63dd23546495a139764682bba2e14706013c619d736297fec54aadc69f
                                                            • Instruction Fuzzy Hash: 73F0F972F001258BD7149A9C98506BBBABBDBC4710F04417EEA09E7394DFB04D05C7D1
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 94b3a9d37be1ea18f08b4f4a4550ba150be9b7ddbe0221e2319ef5b7ee2a0346
                                                            • Instruction ID: 9a0f67a45fd23bf617e843ea39218e59dd2c7e95222021031bf193bdb41da53f
                                                            • Opcode Fuzzy Hash: 94b3a9d37be1ea18f08b4f4a4550ba150be9b7ddbe0221e2319ef5b7ee2a0346
                                                            • Instruction Fuzzy Hash: E701DF7A3016009BC3059B24D564A2EBBA2EFCC722B10852DF90687394DF36EC03CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4cd9783a203366aa6c4c89094042acfc2e0823e2270bc66c7e2475d5b8a4cfd2
                                                            • Instruction ID: 6991580f9f6116b7a32b5e0b586509412c74236086a8cc52862ba44fdef2fd10
                                                            • Opcode Fuzzy Hash: 4cd9783a203366aa6c4c89094042acfc2e0823e2270bc66c7e2475d5b8a4cfd2
                                                            • Instruction Fuzzy Hash: 9E018176301510AFC7059B24D464D1EBBA6EFCC721B108129F90687390DF36EC02CBD5
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4699173666.000000000147D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_147d000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 19255bb63343735156501328bc87fd2239307b0758fee6fcc76a2ea2fc7ac5fe
                                                            • Instruction ID: 509a5030e4a5c76792ce5c52f6930254729731941a98c89edf69344ce7c80e9c
                                                            • Opcode Fuzzy Hash: 19255bb63343735156501328bc87fd2239307b0758fee6fcc76a2ea2fc7ac5fe
                                                            • Instruction Fuzzy Hash: 8DF04976600600AFD3208F0AC984C23FBADFFC4670715C15AE84A4B722C671FC02CAA0
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4699173666.000000000147D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_147d000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 44e2c5d980b5689f1fe2aaaecf734ca1beb400a8746fb1af5d149632d1170db8
                                                            • Instruction ID: 392b260a333741c2ceb9c6c045ee20b1433c6a8e9402ffedebac1cd70675b879
                                                            • Opcode Fuzzy Hash: 44e2c5d980b5689f1fe2aaaecf734ca1beb400a8746fb1af5d149632d1170db8
                                                            • Instruction Fuzzy Hash: DFF03C75104680AFD325CF05CD84C63BFF9FF856607198589E84A8B362C671FC42CBA0
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5e0d94de395bfb55c5d59339e517632ebefd62e2ec80ca92595c459a1ebb8b23
                                                            • Instruction ID: a0bf184f17cb26feb2e17c82bfc66a996f72833326bf468560cb8c5916ee3a5c
                                                            • Opcode Fuzzy Hash: 5e0d94de395bfb55c5d59339e517632ebefd62e2ec80ca92595c459a1ebb8b23
                                                            • Instruction Fuzzy Hash: F2F06DBA3013009FC714DB59D864A3A7BA6EFC9722F1580A9F5468B761CA31EC52CB50
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 071019830b32a92bfe4962f1454725b3864f5123069b22808d041f8273e2f6bc
                                                            • Instruction ID: 9249f5860fb9d06e9264e4067655aeeb0afb30e32df14593f94fe41a54fac0ac
                                                            • Opcode Fuzzy Hash: 071019830b32a92bfe4962f1454725b3864f5123069b22808d041f8273e2f6bc
                                                            • Instruction Fuzzy Hash: D0F055A7300A1487E744111C9920F7F268B8FDA223F04802BE500D73C4EE75DC038392
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 096e95ed48ff391ae18ee9801c30ea68f3ee4ad2824ddba12462022379f29853
                                                            • Instruction ID: 4e8319938061e26358933702b5470a1cb55b7d9f4a112d12714d91897a157775
                                                            • Opcode Fuzzy Hash: 096e95ed48ff391ae18ee9801c30ea68f3ee4ad2824ddba12462022379f29853
                                                            • Instruction Fuzzy Hash: 9FF05E393117049FC714DB59D854D3A7BAAEFC9721B144069F9068B370CE31EC42CB90
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4d2f20b52c7612cfba01e542e27eb26ed0d1daec9a25be2ddaa337f56dd132e0
                                                            • Instruction ID: 8f63e1e8d54bb9e06514b00e569671cbdfd50b2b75f658a4f028bf50d67481b2
                                                            • Opcode Fuzzy Hash: 4d2f20b52c7612cfba01e542e27eb26ed0d1daec9a25be2ddaa337f56dd132e0
                                                            • Instruction Fuzzy Hash: 4EF06D30B01229DBEB159B98C85AFEDBBBABF84211F064019E006AB6A1CB755C05CB40
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 53b0352fde4b75ec9cf230363e1813628507f415e86a6239c196d0b7fbce293a
                                                            • Instruction ID: 9ada8d73907b0498ec36f92edf6307912bc4a2bcafddeb527fe667dd660c2357
                                                            • Opcode Fuzzy Hash: 53b0352fde4b75ec9cf230363e1813628507f415e86a6239c196d0b7fbce293a
                                                            • Instruction Fuzzy Hash: 56F0A0707001009FEB04CB18D980A99BBF2FF88314F158199E509AB361C671FC068F90
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2ef133065002e87680c71437a3126dedb961e0181d1a2be1221b9bd57751f639
                                                            • Instruction ID: 017ae00b33a08eefc716f0b6d10bc94c9f16b9a5b29f4160d6e98a6f7d7ba50a
                                                            • Opcode Fuzzy Hash: 2ef133065002e87680c71437a3126dedb961e0181d1a2be1221b9bd57751f639
                                                            • Instruction Fuzzy Hash: 99E0C27134A2E14BC744E2B478104AF7F97CFC612070880DBA64AC7A80C971580087A5
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a95bb408675919ca39c536d8b38b799339ae8cca5974639f6c2cfb83acc07811
                                                            • Instruction ID: 902f448de4e8f37510559df51063c882dd6801dc9274051d5d50646c822062a6
                                                            • Opcode Fuzzy Hash: a95bb408675919ca39c536d8b38b799339ae8cca5974639f6c2cfb83acc07811
                                                            • Instruction Fuzzy Hash: 8ED0C97630512447C648A6AAB4145AF7A8FDBC9650B04806AAA0A83B44CD71AC0147A9
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 598e9fd18aad0ea1225eed1a531e6fd12c6fcccc1ebe7b5f3d23d367d5b2abcc
                                                            • Instruction ID: 790ec515eef192548fc8140caded1ad53ac1f0d5226e9db23811874ccd85aace
                                                            • Opcode Fuzzy Hash: 598e9fd18aad0ea1225eed1a531e6fd12c6fcccc1ebe7b5f3d23d367d5b2abcc
                                                            • Instruction Fuzzy Hash: 1AD012F76A19408FE3008728DE46F1137E19B69712B168192E0048B676C231DC51CA12
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8c625901efa9d323e61bbca9eaeaa6346019fc15c44c02fa85be1c91796d4152
                                                            • Instruction ID: 988a2dd7b8d7a4ea908002c0da2ebf5e5eae949af81b26e1717480aa799a6baa
                                                            • Opcode Fuzzy Hash: 8c625901efa9d323e61bbca9eaeaa6346019fc15c44c02fa85be1c91796d4152
                                                            • Instruction Fuzzy Hash: ECC012F35116408BF301CB219C16743B722EBF1306B258866D0028B6A4D23AEC93C626
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4ad3df679b61b90ab59cda358e29f69149cf3895bc251f09b3a80d2ccfe1eefa
                                                            • Instruction ID: 9799742c76716f0e4e7ed8dbb7da4002b667036dbcff6e9c873888a84c2794e1
                                                            • Opcode Fuzzy Hash: 4ad3df679b61b90ab59cda358e29f69149cf3895bc251f09b3a80d2ccfe1eefa
                                                            • Instruction Fuzzy Hash: D3C01238400208EFFA705A64D4097253B9CE70433BF1062ADEC08052828B7654928993
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1dd13b6672071f463ec0578a2ab7f3a36feb928cced4d1b552c555836c8d055e
                                                            • Instruction ID: dfd848730448593cf8cc853d3265a061de33f5595ee8011754a62d176d169a47
                                                            • Opcode Fuzzy Hash: 1dd13b6672071f463ec0578a2ab7f3a36feb928cced4d1b552c555836c8d055e
                                                            • Instruction Fuzzy Hash: 63C012B410D2455FC322DA50D814C10BF625FA6304B09C4EEAD45CB257E7329C56E716
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                            • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                                            • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                            • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.4727145820.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_8000000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 894781626bb6f108c90138acae5c1a1113c4c3caafca747ea2007466834e5d14
                                                            • Instruction ID: e1c448589b4da6832f71d680cecb3cb9d57995fb41a1738ce5dc9aed8bf6ade6
                                                            • Opcode Fuzzy Hash: 894781626bb6f108c90138acae5c1a1113c4c3caafca747ea2007466834e5d14
                                                            • Instruction Fuzzy Hash: E7B09232004208AB86009B84E904855BB6DAB686007008066B609061218B32A822DB94

                                                            Execution Graph

                                                            Execution Coverage:7.9%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:89
                                                            Total number of Limit Nodes:12
                                                            execution_graph 16548 2fb4668 16549 2fb4676 16548->16549 16554 2fb6de0 16549->16554 16552 2fb4704 16555 2fb6e05 16554->16555 16563 2fb6edf 16555->16563 16567 2fb6ef0 16555->16567 16556 2fb46e9 16559 2fb421c 16556->16559 16560 2fb4227 16559->16560 16575 2fb8560 16560->16575 16562 2fb8806 16562->16552 16565 2fb6f17 16563->16565 16564 2fb6ff4 16564->16564 16565->16564 16571 2fb6414 16565->16571 16568 2fb6f17 16567->16568 16569 2fb6ff4 16568->16569 16570 2fb6414 CreateActCtxA 16568->16570 16570->16569 16572 2fb7370 CreateActCtxA 16571->16572 16574 2fb7433 16572->16574 16576 2fb856b 16575->16576 16579 2fb8580 16576->16579 16578 2fb88dd 16578->16562 16580 2fb858b 16579->16580 16583 2fb85b0 16580->16583 16582 2fb89ba 16582->16578 16584 2fb85bb 16583->16584 16587 2fb85e0 16584->16587 16586 2fb8aad 16586->16582 16588 2fb85eb 16587->16588 16590 2fb9e93 16588->16590 16593 2fbbed1 16588->16593 16589 2fb9ed1 16589->16586 16590->16589 16599 2fbdf60 16590->16599 16594 2fbbeda 16593->16594 16596 2fbbe91 16593->16596 16605 2fbbef8 16594->16605 16608 2fbbf08 16594->16608 16595 2fbbee6 16595->16590 16596->16590 16601 2fbdf91 16599->16601 16600 2fbdfb5 16600->16589 16601->16600 16616 2fbe120 16601->16616 16620 2fbe110 16601->16620 16602 2fbe045 16602->16589 16611 2fbbff0 16605->16611 16606 2fbbf17 16606->16595 16609 2fbbf17 16608->16609 16610 2fbbff0 GetModuleHandleW 16608->16610 16609->16595 16610->16609 16612 2fbc034 16611->16612 16613 2fbc011 16611->16613 16612->16606 16613->16612 16614 2fbc238 GetModuleHandleW 16613->16614 16615 2fbc265 16614->16615 16615->16606 16617 2fbe12d 16616->16617 16618 2fbe166 16617->16618 16624 2fbc464 16617->16624 16618->16602 16621 2fbe120 16620->16621 16622 2fbe166 16621->16622 16623 2fbc464 4 API calls 16621->16623 16622->16602 16623->16622 16625 2fbc46f 16624->16625 16627 2fbe1d8 16625->16627 16628 2fbc498 16625->16628 16627->16627 16629 2fbc4a3 16628->16629 16630 2fb85e0 4 API calls 16629->16630 16631 2fbe247 16630->16631 16632 2fbe256 16631->16632 16635 2fbe2b0 16631->16635 16641 2fbe2c0 16631->16641 16632->16627 16636 2fbe2ee 16635->16636 16637 2fbc530 GetFocus 16636->16637 16638 2fbe317 16636->16638 16639 2fbe3bf 16636->16639 16637->16638 16638->16639 16640 2fbe3ba KiUserCallbackDispatcher 16638->16640 16640->16639 16642 2fbe2ee 16641->16642 16643 2fbc530 GetFocus 16642->16643 16644 2fbe317 16642->16644 16646 2fbe3bf 16642->16646 16643->16644 16645 2fbe3ba KiUserCallbackDispatcher 16644->16645 16644->16646 16645->16646 16647 2fb6788 16648 2fb67df DuplicateHandle 16647->16648 16649 2fb681e 16648->16649 16650 2fb6540 16651 2fb6586 GetCurrentProcess 16650->16651 16653 2fb65d8 GetCurrentThread 16651->16653 16654 2fb65d1 16651->16654 16655 2fb660e 16653->16655 16656 2fb6615 GetCurrentProcess 16653->16656 16654->16653 16655->16656 16659 2fb664b 16656->16659 16657 2fb6673 GetCurrentThreadId 16658 2fb66a4 16657->16658 16659->16657

                                                            Control-flow Graph

                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 02FB65BE
                                                            • GetCurrentThread.KERNEL32 ref: 02FB65FB
                                                            • GetCurrentProcess.KERNEL32 ref: 02FB6638
                                                            • GetCurrentThreadId.KERNEL32 ref: 02FB6691
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2432901079.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2fb0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 5c6f773a509f6c4e85decce9a86953a37861e9d3993502ed1aa8c435b43607b2
                                                            • Instruction ID: 176712c89eb4691a801cbc67a5dc9c6deddaacf14b263c250135e6db3ac86624
                                                            • Opcode Fuzzy Hash: 5c6f773a509f6c4e85decce9a86953a37861e9d3993502ed1aa8c435b43607b2
                                                            • Instruction Fuzzy Hash: AA5155B1900209CFDB05CFAAD548BDEBFF1AF88318F24845AE109AB390DB745944CF65

                                                            Control-flow Graph

                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 02FB65BE
                                                            • GetCurrentThread.KERNEL32 ref: 02FB65FB
                                                            • GetCurrentProcess.KERNEL32 ref: 02FB6638
                                                            • GetCurrentThreadId.KERNEL32 ref: 02FB6691
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2432901079.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2fb0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 02721557969fb5394b9d62aceb35ff42a9508d5765c5320ab30db33cd76a1647
                                                            • Instruction ID: 182cd7c64cb8dc45941ea8d41633f32f03e20c56e7655ff8c28a1b0c1a6e6d43
                                                            • Opcode Fuzzy Hash: 02721557969fb5394b9d62aceb35ff42a9508d5765c5320ab30db33cd76a1647
                                                            • Instruction Fuzzy Hash: 055124B090024ACFDB15CFAAD548BDEBBF5BF88318F208459E509A7290DB746944CF65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 46 2fbbff0-2fbc00f 47 2fbc03b-2fbc03f 46->47 48 2fbc011-2fbc01e call 2fbaf60 46->48 49 2fbc053-2fbc094 47->49 50 2fbc041-2fbc04b 47->50 53 2fbc020 48->53 54 2fbc034 48->54 57 2fbc0a1-2fbc0af 49->57 58 2fbc096-2fbc09e 49->58 50->49 101 2fbc026 call 2fbc689 53->101 102 2fbc026 call 2fbc698 53->102 54->47 60 2fbc0d3-2fbc0d5 57->60 61 2fbc0b1-2fbc0b6 57->61 58->57 59 2fbc02c-2fbc02e 59->54 64 2fbc170-2fbc230 59->64 65 2fbc0d8-2fbc0df 60->65 62 2fbc0b8-2fbc0bf call 2fbaf6c 61->62 63 2fbc0c1 61->63 67 2fbc0c3-2fbc0d1 62->67 63->67 96 2fbc238-2fbc263 GetModuleHandleW 64->96 97 2fbc232-2fbc235 64->97 68 2fbc0ec-2fbc0f3 65->68 69 2fbc0e1-2fbc0e9 65->69 67->65 71 2fbc100-2fbc109 call 2fbaf7c 68->71 72 2fbc0f5-2fbc0fd 68->72 69->68 77 2fbc10b-2fbc113 71->77 78 2fbc116-2fbc11b 71->78 72->71 77->78 80 2fbc139-2fbc146 78->80 81 2fbc11d-2fbc124 78->81 87 2fbc169-2fbc16f 80->87 88 2fbc148-2fbc166 80->88 81->80 82 2fbc126-2fbc136 call 2fbaf8c call 2fbaf9c 81->82 82->80 88->87 98 2fbc26c-2fbc280 96->98 99 2fbc265-2fbc26b 96->99 97->96 99->98 101->59 102->59
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 02FBC256
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2432901079.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2fb0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 71198db0149efc6fd728669cd6f4a0edd0f8d253e9f68e986188a38491465a21
                                                            • Instruction ID: 98a25510aa4f832c69412fe9926f3a1b2f2b81272bd40470efb0558e545d4247
                                                            • Opcode Fuzzy Hash: 71198db0149efc6fd728669cd6f4a0edd0f8d253e9f68e986188a38491465a21
                                                            • Instruction Fuzzy Hash: C58135B0A00B058FD725DF6AD44479BBBF1FF88684F00892ED18ADBA40DB75E845CB90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 103 2fb6414-2fb7431 CreateActCtxA 106 2fb743a-2fb7494 103->106 107 2fb7433-2fb7439 103->107 114 2fb74a3-2fb74a7 106->114 115 2fb7496-2fb7499 106->115 107->106 116 2fb74a9-2fb74b5 114->116 117 2fb74b8 114->117 115->114 116->117 119 2fb74b9 117->119 119->119
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 02FB7421
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2432901079.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2fb0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 1598fb415478b8d6de6d3968ef00b085dc400f98f5d4ba1dca4ad05e638cef8b
                                                            • Instruction ID: d58be388509581b8dd374f031977bd27def13c53e8eb233de24bea7859886b19
                                                            • Opcode Fuzzy Hash: 1598fb415478b8d6de6d3968ef00b085dc400f98f5d4ba1dca4ad05e638cef8b
                                                            • Instruction Fuzzy Hash: DD41CF71C0061DCBDB25DFAAC944BDEBBB5BF88304F60806AD508AB251DB756945CF90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 120 2fb7364-2fb7431 CreateActCtxA 122 2fb743a-2fb7494 120->122 123 2fb7433-2fb7439 120->123 130 2fb74a3-2fb74a7 122->130 131 2fb7496-2fb7499 122->131 123->122 132 2fb74a9-2fb74b5 130->132 133 2fb74b8 130->133 131->130 132->133 135 2fb74b9 133->135 135->135
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 02FB7421
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2432901079.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2fb0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: bbe6b4c1611c61dedd014b27969c4cd140b174f34408b9a58e4696239c0fe9db
                                                            • Instruction ID: 177ae51e81f14ce1e2989904f8f2421f456900e68a8037a01f26c147ef666466
                                                            • Opcode Fuzzy Hash: bbe6b4c1611c61dedd014b27969c4cd140b174f34408b9a58e4696239c0fe9db
                                                            • Instruction Fuzzy Hash: C741D0B1C00719CBDB25DFAAC944BCEFBB5BF88305F20816AD508AB251DB756949CF90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 136 2fb6780-2fb67dc 139 2fb67df-2fb681c DuplicateHandle 136->139 140 2fb681e-2fb6824 139->140 141 2fb6825-2fb6842 139->141 140->141
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02FB680F
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2432901079.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2fb0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 5ce2d21b89d7fd977c3aa6ff34bd61a3ec44fb828a98e110b32bb8a55bfd8e6f
                                                            • Instruction ID: aaa2d93d398112b4ed0abafe14499df9041502e25fbc6759f1243e2d52cb3dbe
                                                            • Opcode Fuzzy Hash: 5ce2d21b89d7fd977c3aa6ff34bd61a3ec44fb828a98e110b32bb8a55bfd8e6f
                                                            • Instruction Fuzzy Hash: 312126B1900208DFDB11CFAAD884ADEBBF8EF48324F14851AE914A3250D779A944CF64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 144 2fb6788-2fb681c DuplicateHandle 146 2fb681e-2fb6824 144->146 147 2fb6825-2fb6842 144->147 146->147
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02FB680F
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2432901079.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2fb0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 0513080c6daa375f334cc1c9203067a11e485170ce7c48da3ca806cfe2207b4b
                                                            • Instruction ID: c03f3bbb5038ba050be8fc000f08d84391490076eff568d038617434a408d68c
                                                            • Opcode Fuzzy Hash: 0513080c6daa375f334cc1c9203067a11e485170ce7c48da3ca806cfe2207b4b
                                                            • Instruction Fuzzy Hash: BD21E3B59002099FDB10CF9AD984ADEBBF8FF48324F14801AE914A3310D374A954CFA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 150 2fbc1f0-2fbc230 151 2fbc238-2fbc263 GetModuleHandleW 150->151 152 2fbc232-2fbc235 150->152 153 2fbc26c-2fbc280 151->153 154 2fbc265-2fbc26b 151->154 152->151 154->153
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 02FBC256
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2432901079.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2fb0000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: a588d29b713db6ed4c68b8421506846039b7a422dd9a8dac9ba57255527d44e1
                                                            • Instruction ID: 18f0e5a58f5ae8b87bf1278325bf1410d54cf67b3a241785ebfc17e3998f9f0e
                                                            • Opcode Fuzzy Hash: a588d29b713db6ed4c68b8421506846039b7a422dd9a8dac9ba57255527d44e1
                                                            • Instruction Fuzzy Hash: 4F110FB6C002498FCB10CF9AC444ADFFBF4AF88624F10856AD529A7200C3B9A545CFA1
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2432405815.0000000002E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E4D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2e4d000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f79bd04b126a77f99c368d61039cebe1391d489b99ec71a7f48c64703c3f2d9e
                                                            • Instruction ID: edab9d36b8ecdefd54f7f2f74c4716ae9f8400326e598f9e830d2cae5596f94d
                                                            • Opcode Fuzzy Hash: f79bd04b126a77f99c368d61039cebe1391d489b99ec71a7f48c64703c3f2d9e
                                                            • Instruction Fuzzy Hash: 72213475644300EFDB14DF14E9C0B26BB66FB84318F20C56DD90A4B292CB7AE807CA61
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2432405815.0000000002E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E4D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_2e4d000_Exccelworkbook.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d38c3f64ee2118149c128960c766226d9f136db33ca15f26bbcdeb93ebc885d3
                                                            • Instruction ID: 18a79a3ab2bfddecbbb4018c5810264c66e40293608b90aa12f7834f8f07ae4b
                                                            • Opcode Fuzzy Hash: d38c3f64ee2118149c128960c766226d9f136db33ca15f26bbcdeb93ebc885d3
                                                            • Instruction Fuzzy Hash: 9F2165755493C08FCB16CF24D994715BF71EB46218F28C5DAD8498F6A7C33AD40ACB62